Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai
This is a concrete detection of a Mirai botnet variant (EH) targeting Linux systems. It functions as a backdoor, allowing remote attackers to control the compromised device and likely enroll it into a botnet for further malicious activities such as Distributed Denial of Service (DDoS) attacks. The detection is strengthened by both specific code patterns and machine learning behavioral analysis.
No specific strings found for this threat
rule Backdoor_Linux_Mirai_EH_2147901966_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Linux/Mirai.EH!MTB"
threat_id = "2147901966"
type = "Backdoor"
platform = "Linux: Linux platform"
family = "Mirai"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "3"
strings_accuracy = "High"
strings:
$x_1_1 = {48 83 fa 20 48 89 d1 49 89 fa fc 76 53 48 89 f8 48 f7 d8 48 83 e0 07 48 29 c1 48 91 f3 a4 48 89 c1 48 83 e9 20 78 35 66 66 90 66 66 90 66 66 90 48 83 e9 20 48 8b 06 48 8b 56 08 4c 8b 46 10 4c 8b 4e 18 48 89 07 48 89 57 08 4c 89 47 10 4c 89 4f 18 48 8d 76 20 48 8d 7f 20 79 d4 48 83 c1 20 f3 a4 4c 89 d0 c3 90 90 45 31 c0 48 85 ff 41 ba 01 00 00 00 75 61 eb 76 48 0f be 07 4c 8b 0d b5 18 10 00 41 f6 04 41 08 74 64 31 d2 eb 15 6b d2 0a 0f be c1 8d 54 02 d0 81 fa ff 00 00 00 7f 4e 48 ff c7} //weight: 1, accuracy: High
$x_1_2 = {53 b8 64 00 00 00 0f 05 48 3d 00 f0 ff ff 48 89 c3 76 0f e8 6c d5 ff ff 89 da 48 83 cb ff f7 da 89 10 48 89 d8 5b c3} //weight: 1, accuracy: High
$x_1_3 = {48 8d 3c 28 48 89 c3 e8 b9 02 00 00 85 c0 79 04 48 83 cb ff 5a 48 89 d8 5b 5d c3} //weight: 1, accuracy: High
condition:
(filesize < 20MB) and
(all of ($x*))
}fb9192c081c86d098cde51ab9a29ce0e859ffc093c491281cbc223172b69c8bc855477132b0e716426db7b8aa1ee0a9663f721d5f38efcd08bf55252a3691673Immediately isolate the compromised Linux system to prevent further infection and botnet activity. Identify and remove the detected Mirai backdoor executable. Patch all system vulnerabilities, change default/weak credentials, and implement strong network segmentation and firewall rules to block known Mirai command-and-control (C2) communications.