Deciphering Akira's 
 Arsenal: Tactics for Uncovering and Responding
Image Description
Common Information
Type Value
UUID c51f187a-7099-42ec-8f56-8e6d09ff0f4b
Fingerprint 960104aaffd9d10f656a43d03235bcdd960e7679b11dd5cebc39d56cadfd35f4
Analysis status DONE
Considered CTI value 2
Text language
Published None
Added to db Nov. 17, 2024, 6:49 p.m.
Last updated Nov. 17, 2024, 6:50 p.m.
Headline Deciphering Akira's 
 Arsenal: Tactics for Uncovering and Responding
Title Deciphering Akira's 
 Arsenal: Tactics for Uncovering and Responding
Detected Hints/Tags/Attributes 132/3/32
Attributes
Details Type #Events CTI Value
Details CVE 23
cve-2023-20269
Details Domain 22
www.logpoint.com
Details File 39
www.log
Details File 1
b59cc360.exe
Details File 1208
powershell.exe
Details File 351
recycle.bin
Details File 26
akira_readme.txt
Details File 1
fcb3312c.bin
Details File 367
readme.txt
Details File 6
dumpstack.log
Details File 52
pagefile.sys
Details File 10
swapfile.sys
Details File 69
comsvcs.dll
Details File 2125
cmd.exe
Details File 1018
rundll32.exe
Details File 27
c:\windows\system32\comsvcs.dll
Details File 2
fp4.docx
Details File 2
c:\programdata\hp\ms.bat
Details File 2
c:\programdata\hp\svr_dir.txt
Details File 142
wmiprvse.exe
Details File 54
mmc.exe
Details File 1260
explorer.exe
Details File 306
services.exe
Details File 1122
svchost.exe
Details File 30
taskeng.exe
Details File 165
reg.exe
Details md5 1
0885b3153e61caa56117770247be0444
Details md5 2
c7ae7f5becb7cf94aa107ddc1caf4b03
Details sha1 2
923161f345ed3566707f9f878cc311bc6a0c5268
Details IPv4 2
10.1.100.64
Details IPv4 1441
127.0.0.1
Details Windows Registry Key 164
HKLM\SOFTWARE\Microsoft\Windows