ET MALWARE Akira Stealer CnC Domain in DNS Lookup (akira .red)Source: et/open
alert dns $HOME_NET any -> any any (msg:"ET MALWARE Akira Stealer CnC Domain in DNS Lookup (akira .red)"; dns.query; bsize:9; content:"akira.red"; nocase; reference:md5,c9e84d2fed103f6c7a8f1822a42da643; reference:url,tria.ge/230928-pajlaacf36; classtype:trojan-activity; sid:2048379; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_10_02, deployment Perimeter, malware_family Akira, performance_impact Low, confidence High, signature_severity Major, updated_at 2023_10_02, reviewed_at 2023_10_02;)
Reference
md5Search Brave for c9e84d2fed103f6c7a8f1822a42da643
md5Search Google for c9e84d2fed103f6c7a8f1822a42da643
URLhttp://tria.ge/230928-pajlaacf36
Metadata
affected_productWindows_XP_Vista_7_8_10_Server_32_64_Bit
attack_targetClient_Endpoint
created_at2023_10_02
deploymentPerimeter
malware_familyAkira
performance_impactLow
confidenceHigh
signature_severityMajor
updated_at2023_10_02
reviewed_at2023_10_02