Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai
This detection identifies Backdoor:Linux/Mirai.BU, a variant of the notorious Mirai botnet that targets Linux-based IoT devices. It acts as a backdoor, enabling attackers to gain remote control and often enlist the device in large-scale Distributed Denial of Service (DDoS) attacks. The detection is concrete and incorporates behavioral analysis.
No specific strings found for this threat
rule Backdoor_Linux_Mirai_BU_2147822821_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Linux/Mirai.BU!MTB"
threat_id = "2147822821"
type = "Backdoor"
platform = "Linux: Linux platform"
family = "Mirai"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "3"
strings_accuracy = "High"
strings:
$x_2_1 = {8b 5c 0a 04 0f b7 43 2c 8b 53 1c 66 85 c0 0f b7 f8 0f 84 bd 00 00 00 0f b7 73 2a 01 da 31 c9 31 ed c7 44 24 0c ff ff ff ff} //weight: 2, accuracy: High
$x_1_2 = "/dev/watchdog" ascii //weight: 1
$x_1_3 = "/dev/misc/watchdog" ascii //weight: 1
condition:
(filesize < 20MB) and
(
((1 of ($x_2_*) and 1 of ($x_1_*))) or
(all of ($x*))
)
}5ff3c45bba93b2c297d9644a93a751a7be92ab99699964b871f28edbc3c09404bde8f13fae659528196f1f8e322b5e06602ec726968d101100fad5d6029b5986b6a71c77d52ab80bbb5a8e6c15b530eba6047d1ea33aa90ea6d8d2ff4ef0e1f527187ee10725de38744560c8da31a00dfaefb19d08fb476897c0427421ae226a3d54abfa620509fc0b06fff94ece35322c8ff8d76aeb512dae3371538ef4c5d2Immediately isolate the infected Linux device from the network. Remove the malware by reflashing the device firmware or reinstalling the operating system. Strengthen credentials by changing all default or weak passwords, patch systems for known vulnerabilities, and implement network segmentation to prevent further compromise.