user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Backdoor:Linux/Mirai.HI!MTB
Backdoor:Linux/Mirai.HI!MTB - Windows Defender threat signature analysis

Backdoor:Linux/Mirai.HI!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Backdoor:Linux/Mirai.HI!MTB
Classification:
Type:Backdoor
Platform:Linux
Family:Mirai
Detection Type:Concrete
Known malware family with identified signatures
Variant:HI
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai

Summary:

This is a concrete detection of Backdoor:Linux/Mirai.HI!MTB, a variant of the well-known Mirai botnet targeting Linux systems. It establishes a backdoor, providing attackers with remote control to enroll the compromised device into a botnet for launching DDoS attacks or other malicious activities, identified through specific binary patterns and behavioral analysis.

Severity:
Critical
VDM Static Detection:
No specific strings found for this threat
YARA Rule:
rule Backdoor_Linux_Mirai_HI_2147913428_0
{
    meta:
        author = "threatcheck.sh"
        detection_name = "Backdoor:Linux/Mirai.HI!MTB"
        threat_id = "2147913428"
        type = "Backdoor"
        platform = "Linux: Linux platform"
        family = "Mirai"
        severity = "Critical"
        info = "MTB: Microsoft Threat Behavior"
        signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
        threshold = "2"
        strings_accuracy = "High"
    strings:
        $x_1_1 = {00 80 28 21 03 20 30 21 00 a0 20 21 24 02 0f cd 00 00 00 0c 8f 83 81 a8 00 45 28 2b 00 00 20 21 10 a0 00 08 ac 62 00 00 00 c0 c8 21 03 20 f8 09 00 00 00 00 24 03 00 0c 8f bc 00 10 24 04 ff ff ac 43 00 00 8f bf 00 18 00 80 10 21 03 e0 00 08 27 bd 00 20}  //weight: 1, accuracy: High
        $x_1_2 = {24 e8 ff d0 29 02 01 00 10 40 00 24 24 84 00 01 80 86 00 00 00 08 18 c0 00 08 10 40 00 43 10 21 00 06 18 40 00 69 18 21 94 63 00 00 00 46 38 21 30 62 00 08 14 40 ff f2 29 42 00 04 10 40 00 05 00 00 00 00 14 cc 00 15 24 84 00 01 10 00 00 07 00 0b 12 00}  //weight: 1, accuracy: High
    condition:
        (filesize < 20MB) and
        (all of ($x*))
}
Known malware which is associated with this threat:
Filename: zermips
06dd3b36f9fe5ffa7458e6a1d0e15aedeb04bfca79293beec3510d8353658041
31/01/2026
Filename: zermips
c53ddf5b78c75a44e89c8b5b2ade8f8c18939a43f9821412ca6986926a83c0d3
28/01/2026
Filename: zermips
df87a7a75fbcb3907cd9a50599541a524827b421a1d37961cea908f5bd20fba1
27/01/2026
Filename: nklmips
0810579b29a3cb4bbad1809268a1d6e4e1f99835d3b469e72f5709ffd12b9cfd
27/01/2026
Filename: zermips
e444f5df853c333a466fea9c1d7f60caffd68e8e6d241d53f149d13d9b85f873
25/01/2026
Remediation Steps:
Immediately isolate the infected Linux system from the network. Perform a clean reinstallation of the operating system or a thorough malware removal. Ensure all software, firmware, and security patches are up to date to address exploited vulnerabilities, and change all weak or default credentials, particularly for root and administrative accounts.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 14/12/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$