Concrete signature match: Trojan - Appears legitimate but performs malicious actions for Linux platform, family Mirai
This is a concrete detection of Trojan:Linux/Mirai.HAF, a confirmed variant of the notorious Mirai botnet family. This malware targets Linux-based IoT devices, transforming them into bots to launch distributed denial-of-service (DDoS) attacks. The detection leverages machine learning behavioral analysis (!MTB) for high confidence and low false positive risk.
No detailed analysis available from definition files.
d6094e60d369617adc2129eaf39fdbd7503e4f4a0382978c62c38efe1257cfeaa2ded513c4266461de5786f3304cd28b0e9622815e279080052146f96b59bf63d96ab01f98ffc4f7c9e823addde5b5251070d6fd29232d082073b44db0bce2b75ebdff2c8e8f34bd81dcc1ba4592a34c8c0291de8841169ab337b9c14c9b322994005e99979690cb42962e22f1fa5dbabc84048f1e9745abda6501d74e23a7b5Immediately isolate the identified Linux device from the network. Thoroughly scan and remove the detected malware using a robust security solution. Apply all available security patches, disable unnecessary services (e.g., Telnet), change all default credentials, and implement strong, unique passwords for all administrative interfaces to prevent re-infection and secure the device.