Akira ransomware has evolved with a new variant called 'Akira v2' written in Rust, which targets ESXi servers. Rust's executables are challenging to reverse-engineer due to deep in-lining and optimization, complicating analysis. Akira's control flow involves multi-threading and sophisticated file encryption using SOSEMANUK and
Table of contents
Executive SummaryIntroductionOverviewMain functionLock functionConclusionProtectionsIOCs1 Comment
Sort: