Concrete signature match: Trojan - Appears legitimate but performs malicious actions for Linux platform, family Mirai
This is a concrete detection for a trojan from the Mirai malware family, which targets Linux-based systems and IoT devices. The malware infects devices by exploiting weak or default credentials, enrolling them into a botnet used to conduct large-scale Distributed Denial of Service (DDoS) attacks.
No detailed analysis available from definition files.
3886b34a9c980bf5f6d76798fd37506698516e123f22bb756fe6fb12674c4852ed18c8d78c393b471b4b2c6a842333b4d83133c105067f56cf519d55648f077e8b1d867b26163b45ec047eb415747dd7ed1104e484cecca4d823b5106e024132Quarantine and remove the detected file. Identify the source of the file (e.g., WSL, Docker image, network share) and isolate the associated Linux system or IoT device. Change all default or weak credentials on network-accessible Linux systems and IoT devices and scan them for further compromise.