Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai
This is a concrete detection of Backdoor:Linux/Mirai.C!MTB, a variant of the Mirai botnet family targeting Linux systems. It functions as a backdoor, designed to enlist the infected device into a botnet for Distributed Denial of Service (DDoS) attacks, featuring capabilities like process killing, anti-debugging, and specifically targeting UDP/DNS for attack traffic.
Relevant strings associated with this threat: - |#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - }#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - |#75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 (NID) - }#75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 (NID) - &|#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - &}#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - y*|#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID) - y*}#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID) - C|#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - C}#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - L|#3b576869-a4ec-4529-8536-b80a7769e899 (NID) - L}#3b576869-a4ec-4529-8536-b80a7769e899 (NID) - |#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID) - }#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID) - |#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID) - }#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID) - |#d3e037e1-3eb8-44c8-a917-57927947596d (NID) - }#d3e037e1-3eb8-44c8-a917-57927947596d (NID) - |#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID) - }#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID)
rule Backdoor_Linux_Mirai_C_2147766841_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Linux/Mirai.C!MTB"
threat_id = "2147766841"
type = "Backdoor"
platform = "Linux: Linux platform"
family = "Mirai"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "4"
strings_accuracy = "High"
strings:
$x_1_1 = "killer_kill_by_port" ascii //weight: 1
$x_1_2 = "attack_get_opt_ip" ascii //weight: 1
$x_1_3 = "attack_udp_dns" ascii //weight: 1
$x_1_4 = "anti_gdb_entry" ascii //weight: 1
condition:
(filesize < 20MB) and
(all of ($x*))
}abb4758319d678c62c2cd6081e42c21ca61d45865a63d25267ca97f29c74c26dImmediately isolate the infected Linux system to prevent further compromise and botnet participation. Remove the detected malicious file, update all system software and security patches, and enforce strong, unique passwords for all user accounts and network devices. Scan the entire network for other compromised Linux or IoT devices, and consider implementing network segmentation to restrict device communication.