Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai
This detection identifies a concrete variant of the Mirai botnet malware designed to infect Linux-based systems, such as IoT devices and servers. The malware acts as a backdoor, allowing the compromised system to be controlled remotely and used in a botnet for large-scale Distributed Denial-of-Service (DDoS) attacks.
No detailed analysis available from definition files.
2f453e026bcb5b147016977c226fa2067eac648e3640b1e3a0840448f2a084030228cbeda0532a47585e274f83f388a9d800059701efad6dd778cfae051cc8f39def4719216555b05e39569f071c86d815b52b358622ff806998f518dbd72b1f8c7a457dbb3a01c8cc293ca2e1d297c61ff205699015b1bc6ea9e8644466ffc23f279bd6a59e975db164cf5c52b2d4d65be265cf396c0072c41cad8becbc8b8fImmediately use your security software to quarantine and remove the detected file. Investigate the source of the file and scan the network for other potentially infected Linux systems or IoT devices. Change all default credentials on network-accessible devices and ensure they are patched against known vulnerabilities to prevent reinfection.