Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai
This detection identifies a variant of the Mirai botnet malware targeting Linux systems, specifically using concrete static patterns and machine learning behavioral analysis. Mirai typically infects vulnerable IoT and Linux devices to conscript them into a botnet for launching distributed denial-of-service (DDoS) attacks and other malicious activities.
No specific strings found for this threat
rule Backdoor_Linux_Mirai_LF_2147947812_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Linux/Mirai.LF!MTB"
threat_id = "2147947812"
type = "Backdoor"
platform = "Linux: Linux platform"
family = "Mirai"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "2"
strings_accuracy = "High"
strings:
$x_1_1 = {8b 44 24 04 8b 14 24 89 10 c7 40 04 00 00 00 00 8b 54 24 40 8b 43 04 89 02 c7 42 08 02 00 00 00 c7 42 0c 04 00 00 00 8b 44 24 04 eb 2c 8b 54 24 0c 8b 44 24 08 89 02 c7 42 04 00 00 00 00 8b 54 24 40 8b 43 04 89 02 c7 42 08 0a 00 00 00 c7 42 0c 10 00 00 00 8b 44 24 0c} //weight: 1, accuracy: High
$x_1_2 = {0f b6 03 0f b6 53 01 c1 e0 08 09 d0 89 45 04 0f b6 43 02 0f b6 53 03 c1 e0 08 09 d0 89 45 08 0f b6 53 04 0f b6 46 01 c1 e2 18 c1 e0 10 0f b6 4e 02 c1 e1 08 09 c2 0f b6 46 03 09 c2 09 d1 89 4d 0c 0f b6 53 08 0f b6 43 09 c1 e2 08 83 c3 0a 09 c2 89 5d 14 89 55 10 8b 44 24 14 83 c4 10 83 c0 0a 89 45 18 39 54 24 08} //weight: 1, accuracy: High
condition:
(filesize < 20MB) and
(all of ($x*))
}82a7d40ef48bffa210f2d99fdfe30b407521b0a5c69830fff1ebf11cda5816e033c330c36e830ddb47498d0480c5fc4d4a0ac11e4c2f1ba541a128addfcf1b81e88fbee45cf9c2a0ca4c40571a48ed9145f256beeedaa6fea64279f0c22597be18f7518d57f738d6743a8530abc41d99d968c26555fa0bbb45aa0de0165d2de2Immediately isolate the affected Linux system from the network. Remove the malware using an updated security solution, patch all operating system and software vulnerabilities, and enforce strong, unique credentials (especially for services like SSH/Telnet). Implement network segmentation and monitor for suspicious outbound connections to prevent botnet participation.