Loading...
You are here:  Home  >  Notes From Underground

Notes From Underground

November 29, 2025

Akira Binary Reverse Analysis 

or

How the Deviant Child Grew Up

This took some time, what is important here are the indicators that we can develop from this and to show how ransomware evolves. No use of Windows CryptoAPI for its core key management but instead using a statically linked library. For those who don’t care for assembly (and I understand why) read it like a story and it will make sense. Apologies for the formatting and not shading the assembly correctly.

This is a reverse-engineering analysis of an Akira ransomware sample from a case. Starting from the top-level orchestration function (FUN_14004d4c0), it walks through how the sample builds its runtime context: generating timestamped log filenames, parsing command-line options, initializing its custom cryptographic stack, and constructing multi-threaded worker pools that traverse local drives and configured paths.

Subsequent sections break down the encryption run in phases, with attention to how the binary interprets arguments such as --encryption_path, --share_file, and --encryption_percent, as well as the optional -localonly and -dellog switches that control discovery and event-log wiping behavior. The analysis also reconstructs the crypto initialization pipeline around FUN_1400846b0 and FUN_14008a730, showing where embedded key/config blobs are parsed and validated before file encryption proceeds. 

The purpose — to understand and to build good indicators to account for when the EDR fails us.

March 26, 2020

Tupperware Vulnerabilities

As reported on SC Magazine, the Tupperware site was breached with malicious code that activated a fraudulent payment form during the checkout. Suffice to say this could be described as skimming. We sent word to Tupperware but received no response. Now that the news is public we are posting our findings. Click here to read it.

We also sent them a Level 3 Footprint of their presence which had the Russian domain that was doing the skimming. It was ignored as well. Click here to see it.  As always be leery of the sites you give your information to because they will not be quick to help you when your identity or financial information is stolen.

It is amazing how cybersecurity at the corporate level is an after-thought and they continue practicing the same lax procedures regurgitating the same tired rhetoric that simply does not work, who suffers - the customer

March 15, 2020

Covid-19 Cyber Infection

or

The Illness Dwells Inside you

August 22, 2019

This Week’s Asinine Idiosyncrasy Demystified

or

Texas Ransomware and the Big Lie

As you may or may not be aware of, this week it has been reported that twenty-two Texas towns were hit with a Ransomware attack.  For those who are not aware of this, click here to go to the NPR site where the story is discussed. There is an issue that we at Cybercrypto have with how the news is reporting these attacks. We find it to be deceptive and we wish to at a minimum reiterate something we need people to know.

Click here to continue.