user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat TrojanDownloader:Linux/Mirai.H!MTB
TrojanDownloader:Linux/Mirai.H!MTB - Windows Defender threat signature analysis

TrojanDownloader:Linux/Mirai.H!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: TrojanDownloader:Linux/Mirai.H!MTB
Classification:
Type:TrojanDownloader
Platform:Linux
Family:Mirai
Detection Type:Concrete
Known malware family with identified signatures
Variant:H
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan Downloader - Downloads additional malware for Linux platform, family Mirai

Summary:

This detection identifies TrojanDownloader:Linux/Mirai.H!MTB, a concrete variant of the Mirai botnet which primarily targets Linux systems, particularly IoT devices. As a trojan downloader, its main function is to fetch and execute additional malicious payloads, often to enlist devices into a botnet for large-scale DDoS attacks. While categorized for Linux, the presence of Windows-specific behavioral strings suggests a complex attack chain that might involve initial compromise or related components on Windows systems.

Severity:
Critical
VDM Static Detection:
Relevant strings associated with this threat:
 - !#HSTR:IntentBase64 (PEHSTR_EXT)
 - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
 - mshta (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
 - WH_CBT (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
 - WH_DEBUG (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
 - WH_MOUSE (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
 - WH_SHELL (PEHSTR_EXT)
 - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
 - rundll32 (PEHSTR_EXT)
 - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
 - shch (PEHSTR_EXT)
 - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
YARA Rule:
rule TrojanDownloader_Linux_Mirai_H_2147819819_0
{
    meta:
        author = "threatcheck.sh"
        detection_name = "TrojanDownloader:Linux/Mirai.H!MTB"
        threat_id = "2147819819"
        type = "TrojanDownloader"
        platform = "Linux: Linux platform"
        family = "Mirai"
        severity = "Critical"
        info = "MTB: Microsoft Threat Behavior"
        signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
        threshold = "2"
        strings_accuracy = "Low"
    strings:
        $x_1_1 = {00 47 45 54 20 2f [0-32] 6d 69 70 73 20 48 54 54 50 2f 31 2e 30 0d 0a}  //weight: 1, accuracy: Low
        $x_1_2 = {8f 85 80 18 8f 99 80 ?? 26 70 00 ?? 24 a5 ?? ?? 02 20 20 21 03 20 f8 09 02 00 30 21 8f bc 00 10 10 50 00 07 00 00 80 21 8f 99 80 ?? 00 00 00 00 03 20 f8 09 24 04 00 03 8f bc 00 10 00 00 80 21 8f 99 80 ?? 02 20 20 21 27 a5 00 18 03 20 f8 09 24 06 00 01 8f bc 00 10 24 03 00 01 8f 99 80 ?? 10 43 00 04 24 04 00 04 03 20 f8 09}  //weight: 1, accuracy: Low
    condition:
        (filesize < 20MB) and
        (all of ($x*))
}
Known malware which is associated with this threat:
Filename: dlr.mips
4c786bdcde7c976da82b493567df97d39783689f560a0fe8945738b64ad2b3fd
15/01/2026
Filename: dlr.mips
61f29118945e4883ae802db3b79401f9c2d66075ad8337ce4bfe3216052eb8fe
19/12/2025
Remediation Steps:
Immediately isolate any affected Linux hosts and perform a thorough scan to detect and remove the Mirai malware. Ensure all Linux-based devices, especially IoT, are fully patched, have strong, unique credentials, and monitor network traffic for Mirai command-and-control (C2) communications or suspicious activity.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 19/12/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$