user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Backdoor:Linux/Mirai.HP!MTB
Backdoor:Linux/Mirai.HP!MTB - Windows Defender threat signature analysis

Backdoor:Linux/Mirai.HP!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Backdoor:Linux/Mirai.HP!MTB
Classification:
Type:Backdoor
Platform:Linux
Family:Mirai
Detection Type:Concrete
Known malware family with identified signatures
Variant:HP
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai

Summary:

This detection identifies a backdoor associated with the Mirai botnet, specifically targeting Linux systems. The malware infects the device, allowing attackers to control it remotely and use it as part of a larger network to conduct Distributed Denial-of-Service (DDoS) attacks.

Severity:
High
VDM Static Detection:
No specific strings found for this threat
YARA Rule:
rule Backdoor_Linux_Mirai_HP_2147914065_0
{
    meta:
        author = "threatcheck.sh"
        detection_name = "Backdoor:Linux/Mirai.HP!MTB"
        threat_id = "2147914065"
        type = "Backdoor"
        platform = "Linux: Linux platform"
        family = "Mirai"
        severity = "Critical"
        info = "MTB: Microsoft Threat Behavior"
        signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
        threshold = "2"
        strings_accuracy = "High"
    strings:
        $x_1_1 = {f6 83 84 00 00 00 04 0f 44 c2 89 84 24 a0 00 00 00 31 d2 85 f6 74 04 8d 54 24 0c 31 c0 85 db 74 07 8d 84 24 98 00 00 00 6a 08 52 50 ff b4 24 3c 01 00 00 e8 99 00 00 00 83 c4 10 85 f6 89 c3}  //weight: 1, accuracy: High
        $x_1_2 = {8b 73 08 75 17 69 06 6d 4e c6 41 05 39 30 00 00 25 ff ff ff 7f 89 06 89 45 00 eb 2b 8b 4b 04 8b 13 8b 7b 18 8b 01 01 02 8b 02 83 c2 04 d1 e8 39 fa 89 45 00 8d 41 04 72 04}  //weight: 1, accuracy: High
    condition:
        (filesize < 20MB) and
        (all of ($x*))
}
Known malware which is associated with this threat:
Filename: i686
348821fb9bc381b4bcda43574446adf9041ce123183ee169dc943e74937e8352
23/11/2025
Remediation Steps:
Isolate the compromised Linux device from the network immediately. Use your security software to remove the detected file. Change all default or weak credentials on the device, disable unnecessary services like Telnet, and apply all available security patches to prevent reinfection.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 23/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$