Last week one of my company's laptops was infected by the Akira ransomware. I asked a colleague to collect evidence and for this I created an offline collector using the Windows.KapeFiles.Targets artifact selecting "_SANS_triage" as a collection.
Once my colleague sent me the resulting .zip file, I tried to import it into my velociraptor server (using Windows.KapeFiles.Extract artifact) but it returns the error:
File /uploads/ntfs/%5C%5C.%5CC%3A/$Extend/$UsnJrnl%3A$J is too sparse - unable to expand it.
Even with the error, in the output directory I can see that the Windows event log evtx files and the MFT table are there.
How can I proceed from here with Velociraptor in order to detect from where Akira's ransomware or how many actions/modifications have been performed by Akira? Do I need to configure some hunts point to directory where I have extracted the data?
Many thanks
Best regards,
C. L. Martinez
--
You received this message because you are subscribed to the Google Groups "velociraptor-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to velociraptor-dis...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/velociraptor-discuss/AM6PR08MB504601B3B28571434D148695DBFA2%40AM6PR08MB5046.eurprd08.prod.outlook.com.