Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai
This detection signifies the presence of Backdoor:Linux/Mirai.IH!MTB, a specific variant of the Mirai botnet targeting Linux systems. Mirai malware is notorious for compromising networked devices and turning them into 'bots' to launch large-scale Distributed Denial of Service (DDoS) attacks. The '!MTB' suffix indicates that machine learning behavioral analysis contributed to this concrete detection, strongly confirming its malicious intent and capabilities to establish backdoor access.
No specific strings found for this threat
rule Backdoor_Linux_Mirai_IH_2147909013_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Linux/Mirai.IH!MTB"
threat_id = "2147909013"
type = "Backdoor"
platform = "Linux: Linux platform"
family = "Mirai"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "2"
strings_accuracy = "Low"
strings:
$x_1_1 = {8f 99 80 64 8e 44 00 04 03 20 f8 09 02 20 28 21 8f bc 00 10 04 ?? ?? ?? 00 00 00 00 02 22 88 21 10 ?? ?? ?? 02 02 80 23 96 42 00 00 8e 44 00 08 8e 43 00 0c 34 42 00 08 00 64 18 23} //weight: 1, accuracy: Low
$x_1_2 = {96 02 00 10 8e 03 00 04 8e 07 00 0c 92 08 00 12 30 46 ff ff ae 03 00 00 ae 07 00 04 a2 08 00 0a a6 02 00 08 03 20 f8 09 24 c6 ff ed 8f bc 00 10 96 06 00 08 8f 99 80 60 02 00 20 21 03 20 f8 09 02 00 28 21 96 02 00 08 8f bc 00 10 02 02 80 21} //weight: 1, accuracy: High
condition:
(filesize < 20MB) and
(all of ($x*))
}e74ab490530a5cbae3ab2b38aa9e9a0a048d04a6d7a93fcd90c47f34a8df2a0566119f3170e6b11ee66b25cd83538f7206ecbd0aad99cafd09f8ec48483b4804Immediately isolate the infected Linux system from the network to prevent further compromise and its participation in botnet activities. Perform a comprehensive system scan with updated security software to ensure complete eradication. Investigate the initial compromise vector, focusing on patching any exploited vulnerabilities and strengthening all default or weak credentials for SSH, web interfaces, and other services. Monitor network traffic for suspicious outbound connections indicative of DDoS activity or C2 communication.