Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Akira

Akira

Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the ransomware-as-a-service entityAkira.Akira ransomware has been used in attacks across North America, Europe, and Australia, with a focus on critical infrastructure sectors including manufacturing, education, and IT services.Akira ransomware employs hybrid encryption and threading to increase the speed and efficiency of encryption and runtime arguments for tailored attacks. Notable variants include Rust-basedMegazord for targeting Windows andAkira _v2 for targeting VMware ESXi servers.[1][2][3]

ID: S1129
Type: MALWARE
Platforms: Windows
Contributors: Jiraput Thamsongkrah
Version: 2.0
Created: 04 April 2024
Last Modified: 11 March 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

Akira will execute PowerShell commands to delete system volume shadow copies.[1][2]

.003Command and Scripting Interpreter:Windows Command Shell

Akira executes from the Windows command line and can take various arguments for execution.[1]

EnterpriseT1486Data Encrypted for Impact

Akira can encrypt victim filesystems for financial extortion purposes including through the use of the ChaCha20 and ChaCha8 stream ciphers.[1][2][3]

EnterpriseT1083File and Directory Discovery

Akira examines files prior to encryption to determine if they meet requirements for encryption and can be encrypted by the ransomware. These checks are performed through native Windows functions such asGetFileAttributesW.[1][3]

EnterpriseT1490Inhibit System Recovery

Akira will delete system volume shadow copies via PowerShell commands.[1][2]

EnterpriseT1106Native API

Akira executes native Windows functions such asGetFileAttributesW andGetSystemInfo.[1]

EnterpriseT1135Network Share Discovery

Akira can identify remote file shares for encryption.[1]

EnterpriseT1057Process Discovery

Akira verifies the deletion of volume shadow copies by checking for the existence of the process ID related to the process created to delete these items.[1]

EnterpriseT1082System Information Discovery

Akira uses theGetSystemInfo Windows function to determine the number of processors on a victim machine.[1]

EnterpriseT1047Windows Management Instrumentation

Akira will leverage COM objects accessed through WMI during execution to evade detection.[1]

Groups That Use This Software

IDNameReferences
G1024Akira

[1][3]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp