Concrete signature match: Trojan Downloader - Downloads additional malware for Linux platform, family Mirai
This detection identifies TrojanDownloader:Linux/Mirai.H!MTB, a concrete variant of the Mirai botnet which primarily targets Linux systems, particularly IoT devices. As a trojan downloader, its main function is to fetch and execute additional malicious payloads, often to enlist devices into a botnet for large-scale DDoS attacks. While categorized for Linux, the presence of Windows-specific behavioral strings suggests a complex attack chain that might involve initial compromise or related components on Windows systems.
Relevant strings associated with this threat: - !#HSTR:IntentBase64 (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - mshta (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - WH_CBT (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - WH_DEBUG (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - WH_MOUSE (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - WH_SHELL (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - shch (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
rule TrojanDownloader_Linux_Mirai_H_2147819819_0
{
meta:
author = "threatcheck.sh"
detection_name = "TrojanDownloader:Linux/Mirai.H!MTB"
threat_id = "2147819819"
type = "TrojanDownloader"
platform = "Linux: Linux platform"
family = "Mirai"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "2"
strings_accuracy = "Low"
strings:
$x_1_1 = {00 47 45 54 20 2f [0-32] 6d 69 70 73 20 48 54 54 50 2f 31 2e 30 0d 0a} //weight: 1, accuracy: Low
$x_1_2 = {8f 85 80 18 8f 99 80 ?? 26 70 00 ?? 24 a5 ?? ?? 02 20 20 21 03 20 f8 09 02 00 30 21 8f bc 00 10 10 50 00 07 00 00 80 21 8f 99 80 ?? 00 00 00 00 03 20 f8 09 24 04 00 03 8f bc 00 10 00 00 80 21 8f 99 80 ?? 02 20 20 21 27 a5 00 18 03 20 f8 09 24 06 00 01 8f bc 00 10 24 03 00 01 8f 99 80 ?? 10 43 00 04 24 04 00 04 03 20 f8 09} //weight: 1, accuracy: Low
condition:
(filesize < 20MB) and
(all of ($x*))
}4c786bdcde7c976da82b493567df97d39783689f560a0fe8945738b64ad2b3fd61f29118945e4883ae802db3b79401f9c2d66075ad8337ce4bfe3216052eb8feImmediately isolate any affected Linux hosts and perform a thorough scan to detect and remove the Mirai malware. Ensure all Linux-based devices, especially IoT, are fully patched, have strong, unique credentials, and monitor network traffic for Mirai command-and-control (C2) communications or suspicious activity.