user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Backdoor:Linux/Mirai.BZ!xp
Backdoor:Linux/Mirai.BZ!xp - Windows Defender threat signature analysis

Backdoor:Linux/Mirai.BZ!xp - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Backdoor:Linux/Mirai.BZ!xp
Classification:
Type:Backdoor
Platform:Linux
Family:Mirai
Detection Type:Concrete
Known malware family with identified signatures
Variant:BZ
Specific signature variant within the malware family
Suffix:!xp
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai

Summary:

This is a concrete detection of Backdoor:Linux/Mirai.BZ!xp, a variant of the Mirai botnet family specifically targeting Linux systems. It establishes a backdoor to gain unauthorized remote access and control, typically enrolling the compromised device into a botnet for launching distributed denial-of-service (DDoS) attacks.

Severity:
Critical
VDM Static Detection:
No specific strings found for this threat
YARA Rule:
rule Backdoor_Linux_Mirai_BZ_2147822220_0
{
    meta:
        author = "threatcheck.sh"
        detection_name = "Backdoor:Linux/Mirai.BZ!xp"
        threat_id = "2147822220"
        type = "Backdoor"
        platform = "Linux: Linux platform"
        family = "Mirai"
        severity = "Critical"
        info = "xp: an internal category used to refer to some threats"
        signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
        threshold = "2"
        strings_accuracy = "High"
    strings:
        $x_1_1 = {20 84 e5 02 10 c4 e5 10 20 93 e5 14 10 84 e2 40 c4 a0 e1 58 30 a0 e3 05 c0 c4 e5 04 00 c4 e5 03 30 c1 e5 0d}  //weight: 1, accuracy: High
        $x_1_2 = {30 c0 e5 26 30 d4 e5 b0 30 c3 e3 40 30 83 e3 26 30 c4 e5 14 30 9d e5 1c 10 87}  //weight: 1, accuracy: High
    condition:
        (filesize < 20MB) and
        (all of ($x*))
}
Known malware which is associated with this threat:
Filename: arm5
5aee6427aff650e6d5bd10badc9cd2a117a3bde73ef501c786508cac61cecfca
30/01/2026
Filename: arm
0211c9bc19d358561d72f7cce28914c9770a4bcb682477c8381af8cd353bcfd9
30/01/2026
Filename: mirai.arm
92735c3ce99d256a30641b4c1e4b63dedc3d5befd15b498d32ade8a2334e2f28
28/12/2025
Filename: mirai.arm5n
00b87e3cc9933a93b0c6fff21f3f6c0666be295dfd685d8e49df4187e7d07b8b
28/12/2025
Filename: arm5
ac2b28c8526a7570143b1946b16c0aae98c53e89cf6d68faca8236a3b108ba9b
16/12/2025
Remediation Steps:
Immediately isolate the compromised Linux system to prevent further network spread. Remove the malicious files and binaries. Patch all operating system and application vulnerabilities, and strengthen access controls by changing default or weak credentials for all network devices. Implement network segmentation and egress filtering to block Mirai-related command-and-control (C2) communication.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 16/12/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$