General
-
Target
0789a9c0a0d4f3422cb4e9b8e64f1ba92f7b88e2edfd14b7b9a7f5eee5135a4f
-
Size
75KB
-
Sample
230222-ebnarahf94
-
MD5
ee9c6e60027c8ce65003de32d6125914
-
SHA1
97872dbc8df6d6c4cc6419e81994336503c748f9
-
SHA256
0789a9c0a0d4f3422cb4e9b8e64f1ba92f7b88e2edfd14b7b9a7f5eee5135a4f
-
SHA512
78b53a0b34ffca4bc07b318ae8d23c3a74a9fb3ab2801e25888f1cf7690cb8ed72460ff36d11b3ddeebfd15e2a62e353efb63b7a9c2ae2a15607875ca1052bb3
-
SSDEEP
768:FbzkUtPX9DUetap1YOc8tmmSuDsCHJexou+nPp18vjILhussGdamRv5qmppQHUdv:SaX1LGfDpRRuI0PuvtOuSG4yr
Static task
static1
Behavioral task
behavioral1
Sample
0789a9c0a0d4f3422cb4e9b8e64f1ba92f7b88e2edfd14b7b9a7f5eee5135a4f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0789a9c0a0d4f3422cb4e9b8e64f1ba92f7b88e2edfd14b7b9a7f5eee5135a4f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
Targets
-
-
Target
0789a9c0a0d4f3422cb4e9b8e64f1ba92f7b88e2edfd14b7b9a7f5eee5135a4f
-
Size
75KB
-
MD5
ee9c6e60027c8ce65003de32d6125914
-
SHA1
97872dbc8df6d6c4cc6419e81994336503c748f9
-
SHA256
0789a9c0a0d4f3422cb4e9b8e64f1ba92f7b88e2edfd14b7b9a7f5eee5135a4f
-
SHA512
78b53a0b34ffca4bc07b318ae8d23c3a74a9fb3ab2801e25888f1cf7690cb8ed72460ff36d11b3ddeebfd15e2a62e353efb63b7a9c2ae2a15607875ca1052bb3
-
SSDEEP
768:FbzkUtPX9DUetap1YOc8tmmSuDsCHJexou+nPp18vjILhussGdamRv5qmppQHUdv:SaX1LGfDpRRuI0PuvtOuSG4yr
Score10/10-
Quantum Ransomware
A rebrand of the MountLocker ransomware first seen in August 2021.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops desktop.ini file(s)
-