ET MALWARE Observed Akira Stealer Domain (akira .red) in TLS SNISource: et/open
alert tls $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE Observed Akira Stealer Domain (akira .red) in TLS SNI"; flow:established,to_server; tls.sni; bsize:9; content:"akira.red"; fast_pattern; reference:md5,c9e84d2fed103f6c7a8f1822a42da643; reference:url,tria.ge/230928-pajlaacf36/behavioral2; classtype:trojan-activity; sid:2048380; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_10_02, deployment Perimeter, malware_family Akira, performance_impact Low, confidence High, signature_severity Major, updated_at 2023_10_02, reviewed_at 2023_10_02;)
Reference
md5Search Brave for c9e84d2fed103f6c7a8f1822a42da643
md5Search Google for c9e84d2fed103f6c7a8f1822a42da643
URLhttp://tria.ge/230928-pajlaacf36/behavioral2
Metadata
affected_productWindows_XP_Vista_7_8_10_Server_32_64_Bit
attack_targetClient_Endpoint
created_at2023_10_02
deploymentPerimeter
malware_familyAkira
performance_impactLow
confidenceHigh
signature_severityMajor
updated_at2023_10_02
reviewed_at2023_10_02