alert dns $HOME_NET any -> any any (msg:"ET MALWARE Akira Stealer CnC Domain in DNS Lookup (akira .red)"; dns.query; bsize:9; content:"akira.red"; nocase; reference:md5,c9e84d2fed103f6c7a8f1822a42da643; reference:url,tria.ge/230928-pajlaacf36; classtype:trojan-activity; sid:2048379; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_10_02, deployment Perimeter, malware_family Akira, performance_impact Low, confidence High, signature_severity Major, updated_at 2023_10_02, reviewed_at 2023_10_02;)
Metadata | |
---|
affected_product | Windows_XP_Vista_7_8_10_Server_32_64_Bit |
attack_target | Client_Endpoint |
created_at | 2023_10_02 |
deployment | Perimeter |
malware_family | Akira |
performance_impact | Low |
confidence | High |
signature_severity | Major |
updated_at | 2023_10_02 |
reviewed_at | 2023_10_02 |