Concrete signature match: Trojan - Appears legitimate but performs malicious actions for Linux platform, family Mirai
This is a concrete detection for a trojan from the Mirai malware family, which targets Linux-based systems and IoT devices. The malware infects devices by exploiting weak or default credentials, enrolling them into a botnet used to conduct large-scale Distributed Denial of Service (DDoS) attacks.
No detailed analysis available from definition files.
0e9056a0deb739e40881604c6f6179b9e1396bba29fb9d9412d12c28ad21705cedda5b721eb32bbaa38f253667fe19201194dcd886ae82dc458f008b09c398ac640b76e1981ed1aa54bc7134f2dd139474ef3644743b0a97cc839e17467797ebf5428fce84a53a4426b88af0f048f6eafecce6e0b69593a4b46ff7df4d1ac4d4a7fcd4f5b1ac4bb19f454d172cb2b6b5c631d77a665c88b2dbd3272eaf8d84e3Quarantine and remove the detected file. Identify the source of the file (e.g., WSL, Docker image, network share) and isolate the associated Linux system or IoT device. Change all default or weak credentials on network-accessible Linux systems and IoT devices and scan them for further compromise.