Concrete signature match: Trojan - Appears legitimate but performs malicious actions for Linux platform, family SAgnt
This threat is a Trojan designed for Linux systems, identified as a variant of the SAgnt malware family. It likely functions as a backdoor or remote access agent, enabling attackers to execute commands, steal data, or deploy additional malware. The detection was made by a machine learning model based on the file's suspicious behavior.
No specific strings found for this threat
rule Trojan_Linux_SAgnt_Q_2147928566_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Linux/SAgnt.Q!MTB"
threat_id = "2147928566"
type = "Trojan"
platform = "Linux: Linux platform"
family = "SAgnt"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "2"
strings_accuracy = "High"
strings:
$x_1_1 = {be a8 12 60 00 55 48 81 ee a8 12 60 00 48 c1 fe 03 48 89 e5 48 89 f0 48 c1 e8 3f 48 01 c6 48 d1 fe 74 15 b8 00 00 00 00 48 85 c0 74 0b 5d bf a8 12 60 00 ff e0 0f 1f 00 5d c3 66 0f 1f 44 00 00 80 3d a9 06 20 00 00 75 11 55 48 89 e5 e8 6e ff ff ff 5d c6 05 96 06 20 00 01 f3 c3 0f 1f 40 00 bf 10 10 60 00 48 83 3f 00 75 05 eb 93 0f 1f 00 b8 00 00 00 00 48 85 c0 74 f1 55 48 89 e5 ff d0 5d e9 7a ff ff ff} //weight: 1, accuracy: High
$x_1_2 = {e8 00 ff ff ff ff c0 75 0c bf 0a 00 00 00 e8 02 ff ff ff eb df 31 c9 ba 06 00 00 00 be e4 0c 40 00 89 df e8 2d fe ff ff 66 8b 44 24 1e 48 8d 74 24 02 31 c9 ba 02 00 00 00 89 df 88 44 24 02 66 c1 e8 08 88 44 24 03 e8 09 fe ff ff 48 8d 74 24 2f 31 c9 ba 20 00 00 00 89 df e8 f6 fd ff ff 31 d2 31 c0 be eb 0c 40 00 bf 3f 01 00 00 e8 43 fe ff ff 85 c0 41 89 c4} //weight: 1, accuracy: High
condition:
(filesize < 20MB) and
(all of ($x*))
}32bb87fd237a963945bd848a9985fe4c3fb3ec86d38136355ee997becf258d1a62e9a01307bcf85cdaeecafd6efb5be72a622c43a10f06d6d6d3b566b072228dcfe5c46e00babe4c91135cb2ec89852b764b1c255f3c6a220bf90f35aac3dff88ad5ab76715dc232abb93983a295713872af9488037383c73a2f96f9fe6b63b2344c391cfd4fd30407bf55872d05d44b679a117e407114c0e113b3c6c4cbbb29Isolate the affected system or environment (e.g., WSL, container). Use the security tool to remove the threat, then scan for any related malicious activity or persistence. Investigate the source of the file to prevent re-infection.