alert tls $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE Observed Akira Stealer Domain (akira .red) in TLS SNI"; flow:established,to_server; tls.sni; bsize:9; content:"akira.red"; fast_pattern; reference:md5,c9e84d2fed103f6c7a8f1822a42da643; reference:url,tria.ge/230928-pajlaacf36/behavioral2; classtype:trojan-activity; sid:2048380; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_10_02, deployment Perimeter, malware_family Akira, performance_impact Low, confidence High, signature_severity Major, updated_at 2023_10_02, reviewed_at 2023_10_02;)
Metadata | |
---|
affected_product | Windows_XP_Vista_7_8_10_Server_32_64_Bit |
attack_target | Client_Endpoint |
created_at | 2023_10_02 |
deployment | Perimeter |
malware_family | Akira |
performance_impact | Low |
confidence | High |
signature_severity | Major |
updated_at | 2023_10_02 |
reviewed_at | 2023_10_02 |