General
-
Target
2a7a76cde7e970c06316e3ae4feadbe3.bin
-
Size
432KB
-
Sample
240905-bgvp8s1cpe
-
MD5
ae35977260849a4e694f2496d202765d
-
SHA1
6f28161d779e5dc94a326502f9ce104d1d365821
-
SHA256
df8da50f691d114e545c4520f2e1c559d3ae2f2df7d80bb33ced0176475e51dc
-
SHA512
71f6b3c08b7de29711f5de0cf971937aaf824858ff37fdd002101ece71379273a459ca10023f5b48067dc295d9a10713b1bebb7502b0d6531a723c33df5ed764
-
SSDEEP
6144:JCdZybVMOF9cqK2wQpcjmwoMLqPmICz9dPuRiXhbbE2izRXh3jNtNFP4gcrI7NnS:JdhMO0qxcDlbWiXp42wFNFa6nS
Static task
static1
Behavioral task
behavioral1
Sample
2c7aeac07ce7f03b74952e0e243bd52f2bfa60fadc92dd71a6a1fee2d14cdd77.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c7aeac07ce7f03b74952e0e243bd52f2bfa60fadc92dd71a6a1fee2d14cdd77.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\PerfLogs\Admin\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Targets
-
-
Target
2c7aeac07ce7f03b74952e0e243bd52f2bfa60fadc92dd71a6a1fee2d14cdd77.exe
-
Size
879KB
-
MD5
2a7a76cde7e970c06316e3ae4feadbe3
-
SHA1
89d195f59bba9c3b43635607f9f1c3051645332c
-
SHA256
2c7aeac07ce7f03b74952e0e243bd52f2bfa60fadc92dd71a6a1fee2d14cdd77
-
SHA512
834f76c0de678d26507fa1a3446cf6336952d36bd2857113f1bbaddf0d33132d4c579bfd232194868c8dc4ddefa66a9c589610e74f4a808787b8edf36f3d5b4f
-
SSDEEP
24576:dpN2CMwVhLcqnB+c9z2Va31qIU2p1GA3zaIJYj9+M+C6vU1KKoPAFGG+TR3aZX:UC5Uqn4c9z2Vu1qIU2pAA3rM+C6vZJAp
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (9035) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell command to delete shadowcopy.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1