user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Backdoor:Linux/Mirai.EO!MTB
Backdoor:Linux/Mirai.EO!MTB - Windows Defender threat signature analysis

Backdoor:Linux/Mirai.EO!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Backdoor:Linux/Mirai.EO!MTB
Classification:
Type:Backdoor
Platform:Linux
Family:Mirai
Detection Type:Concrete
Known malware family with identified signatures
Variant:EO
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai

Summary:

This threat is a variant of the Mirai botnet malware, which targets Linux systems to incorporate them into a network of infected devices. The botnet is primarily used to launch large-scale Distributed Denial-of-Service (DDoS) attacks. The detection is based on machine learning behavioral analysis, indicating malicious activity consistent with Mirai.

Severity:
Medium
VDM Static Detection:
No specific strings found for this threat
YARA Rule:
rule Backdoor_Linux_Mirai_EO_2147904934_0
{
    meta:
        author = "threatcheck.sh"
        detection_name = "Backdoor:Linux/Mirai.EO!MTB"
        threat_id = "2147904934"
        type = "Backdoor"
        platform = "Linux: Linux platform"
        family = "Mirai"
        severity = "Critical"
        info = "MTB: Microsoft Threat Behavior"
        signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
        threshold = "2"
        strings_accuracy = "High"
    strings:
        $x_1_1 = {55 69 04 3e 55 60 84 3e 7c 00 4a 14 54 ea 04 3e 89 63 00 09 54 e9 84 3e 7d 28 4a 14 7c 00 52 14 7d 29 5a 14 7c 00 2a 14 7c 09 02 14 54 09 84 3f 41 82 00 14}  //weight: 1, accuracy: High
        $x_1_2 = {81 23 00 00 7c 0a 48 ae 7c c0 02 78 7c 0a 49 ae 81 63 00 00 7c 0a 58 ae 7c e0 02 78 7c 0a 59 ae 81 23 00 00 7c 0a 48 ae 7d 00 02 78 7c 0a 49 ae 81 63 00 00 7c 0a 58 ae 7c a0 02 78 7c 0a 59 ae 39 4a 00 01 a0 03 00 04 7f 80 50 00 41 9d ff b4}  //weight: 1, accuracy: High
    condition:
        (filesize < 20MB) and
        (all of ($x*))
}
Known malware which is associated with this threat:
Filename: frost.ppc
018326c93a62d3299a521032ffd6a93e1b93c40fce5e81bcb9fc49b893cd23f0
12/12/2025
Filename: nwfaiehg4ewijfgriehgirehaughrarg.ppc
3e87a6899a5ee68ba1b8a5a80450bf9fb02019cfd5061f89bd4834c4d9e01999
11/12/2025
Filename: Labelloperc80.ppc
36c0e2b89c825fe89f5d8e0c914f9e0252cd11a71a31c6ff2571af6bc63686d6
11/12/2025
Filename: ppc
95d5e5ca4f47b3d93bcff47d77fa99dbdabd13f8fa02464c51bf58c2df549017
10/12/2025
Filename: ppc
a8729a3de5ed66b780e95bffb017c38fd55f598f4bedcfa8776daa206d58547e
08/12/2025
Remediation Steps:
Isolate the affected system from the network immediately. Ensure the detected file is quarantined or removed. Change all default and weak credentials on the system and network devices, and review firewall rules to restrict access to management ports like SSH and Telnet.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 08/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$