user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:Linux/CoinMiner!MTB
Trojan:Linux/CoinMiner!MTB - Windows Defender threat signature analysis

Trojan:Linux/CoinMiner!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:Linux/CoinMiner!MTB
Classification:
Type:Trojan
Platform:Linux
Family:CoinMiner
Detection Type:Concrete
Known malware family with identified signatures
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for Linux platform, family CoinMiner

Summary:

This is a trojan for Linux systems designed to secretly mine cryptocurrency. It hijacks the system's CPU and GPU resources, causing severe performance degradation and increased power consumption. The '!MTB' designation indicates this was identified by a high-confidence machine learning behavioral model.

Severity:
Medium
VDM Static Detection:
No detailed analysis available from definition files.
Known malware which is associated with this threat:
Filename: e948036f1c3b3024a6864fa1c49332c80e1fd28484cf487233a50154ffe104f8
e948036f1c3b3024a6864fa1c49332c80e1fd28484cf487233a50154ffe104f8
12/11/2025
Remediation Steps:
Isolate the affected Linux host, container, or WSL instance. Terminate the malicious mining process and remove the associated executable and any persistence mechanisms (e.g., cron jobs). Investigate the initial access vector to prevent reinfection.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 12/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$