user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat TrojanDownloader:Linux/ShellAgent.E!AMTB
TrojanDownloader:Linux/ShellAgent.E!AMTB - Windows Defender threat signature analysis

TrojanDownloader:Linux/ShellAgent.E!AMTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: TrojanDownloader:Linux/ShellAgent.E!AMTB
Classification:
Type:TrojanDownloader
Platform:Linux
Family:ShellAgent
Detection Type:Concrete
Known malware family with identified signatures
Variant:E
Specific signature variant within the malware family
Suffix:!AMTB
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan Downloader - Downloads additional malware for Linux platform, family ShellAgent

Summary:

TrojanDownloader:Linux/ShellAgent.E!AMTB is a malicious shell script designed to run on Linux systems. Its primary purpose is to connect to a remote server to download and execute additional malware, creating a backdoor for further system compromise.

Severity:
High
VDM Static Detection:
Relevant strings associated with this threat:
 - |#TEL (NID)
 - }#TEL (NID)
 - gq|#TEL (NID)
 - gq}#TEL (NID)
 - |#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID)
 - }#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID)
 - |#75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 (NID)
 - }#75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 (NID)
 - &|#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID)
 - &}#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID)
 - y*|#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID)
 - y*}#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID)
 - C|#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID)
 - C}#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID)
 - L|#3b576869-a4ec-4529-8536-b80a7769e899 (NID)
 - L}#3b576869-a4ec-4529-8536-b80a7769e899 (NID)
 - |#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID)
 - }#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID)
 - |#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID)
 - }#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID)
Known malware which is associated with this threat:
Filename: router.dlink-rep.sh
587c377656cfe5b817e1969679f02247de6b08a80859c32d77da523075c2a8bc
05/12/2025
Remediation Steps:
Isolate the affected Linux host from the network immediately. Identify and remove the malicious script file and any downloaded secondary payloads. Investigate system logs, cron jobs, and systemd services for persistence mechanisms and signs of lateral movement.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 05/12/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$