Akira

Evaluating an Akira sample found on Vx Underground. Previously known malicious software.

MD5: 503f112e243519a1b9e0344499561908 SHA256: 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc

Compiler: MSVC Linker: MS LINKER

Function Imports

KERNEL32.dll

114 function calls - Will update here after finding the purpose of some.

ADVAPI32.dll

CryptEncrypt CryptAcquireContextW CryptGenRandom

CRYPT32.dll

CryptDecodeObjectEx CryptStringToBinaryA CryptImportPublicKeyInfo

WTSAPI32.dll

WTSEnumerateProcessesW WTSFreeMemory

RstrtMgr.DLL

RmStartSession RmRegisterResources RmEndSession RmGetList RmShutdown

Strings to note - Captured with FLOSS

Ransom Note - Akira_readme.txt

Dynamic Analysis

Running the program from the console as admin while having procmon running allows us to gather the following info:

  • The program starts by opening registry keys inside HKLM\System\CurrentControlSet\Control

    • Control Session Manager

    • SafeBoot

    • Srp\GP\DLL

    • FileSystem

  • Then it opens all the DLLs. Some to note are:

    • bcryptprimitives.dll

    • crypt32.dll

    • ncrypt.dll

    • cryptbase.dll`

  • The program will start creating ransom notes in every folder. Then it will encrypt and rewrite all files in each folder.

  • Some files are excluded from the encryption:

    • .exe

    • .dll

    • .lnk

  • Some folders are excluded from the encryption:

    • C:\Windows

  • Renaming extensions from text files back to their original form allows to see some strings. However files will still be corrupted.

Last updated