Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Tusnami
This is a concrete detection of Backdoor:Linux/Tusnami.C!MTB, a Linux-based backdoor malware. This threat provides unauthorized remote access and control over the compromised system, indicating a severe breach and potential for further malicious activities.
Relevant strings associated with this threat: - |#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - }#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - |#75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 (NID) - }#75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 (NID) - &|#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - &}#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - y*|#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID) - y*}#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID) - C|#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - C}#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - L|#3b576869-a4ec-4529-8536-b80a7769e899 (NID) - L}#3b576869-a4ec-4529-8536-b80a7769e899 (NID) - |#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID) - }#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID) - |#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID) - }#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID) - |#d3e037e1-3eb8-44c8-a917-57927947596d (NID) - }#d3e037e1-3eb8-44c8-a917-57927947596d (NID) - |#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID) - }#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID)
rule Backdoor_Linux_Tusnami_C_2147788409_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Linux/Tusnami.C!MTB"
threat_id = "2147788409"
type = "Backdoor"
platform = "Linux: Linux platform"
family = "Tusnami"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "2"
strings_accuracy = "Low"
strings:
$x_1_1 = "nandemo shiranai wa yo" ascii //weight: 1
$x_1_2 = "hitteru koto dake" ascii //weight: 1
$x_1_3 = {41 6c 72 65 61 64 79 [0-2] 6e 69 6e 67 2e} //weight: 1, accuracy: Low
$x_1_4 = ":KILL_PORT" ascii //weight: 1
condition:
(filesize < 20MB) and
(2 of ($x*))
}6730eb04edf45d590939d7ba36ca0d4f1d2f28a2692151e3c631e9f2d3612893184dba33e23297345d0c88fea4c0931a692a143c6d6cbbaae5ace19e08f83833cd22d7a8e1ff2749ada4d254975a374dd40b27ad1203ecef4b777b32e09094777651345acd772a4048ed69490bdd02d7dab39d0fb02e9a1aec565a5f1503969ca7682d1edc81925c3d7d2738db2283c742144d8321cfaf1888cdb66c1cd6ae83Immediately isolate the affected Linux system to prevent further compromise. Perform a comprehensive system scan with updated security software to fully eradicate the malware. Investigate for persistence mechanisms, lateral movement, and any data exfiltration, patching all vulnerabilities and resetting critical credentials as necessary.