General
-
Target
b63e94928da25e18caa1506305b9ca3dedc267e747dfa4710860e757d2cc8192
-
Size
75KB
-
Sample
230228-rys6qsbd5z
-
MD5
0706764b3963df092079d3bdef787a1f
-
SHA1
73c2460d59f3d0637523ca6d35425aae14358ba1
-
SHA256
b63e94928da25e18caa1506305b9ca3dedc267e747dfa4710860e757d2cc8192
-
SHA512
3af7ff3b2aa689eb4c410562b5ead74ff77417da941521928391c6fac3dcc6a75f6d866f52b12f67a41564cfa81afcda51857c0f208f9e90e8629e0f0b5d5cb4
-
SSDEEP
1536:9aX51pVH9hsgNGLs6BLM1frxz/HTfcKKBaJGp:OfJGLs6BwNxnfTKsG
Static task
static1
Behavioral task
behavioral1
Sample
b63e94928da25e18caa1506305b9ca3dedc267e747dfa4710860e757d2cc8192.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b63e94928da25e18caa1506305b9ca3dedc267e747dfa4710860e757d2cc8192.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
http://tijykgureh7kqq5cczzeutaoxvmf6yinpar72o3bxome7b44vwqxadyd.onion/?cid=9064d8b148a0f19a9e3598a6e0b0aeb16d21da8260218355164eefdf45b6ef60
Extracted
C:\Users\Admin\Contacts\README_TO_DECRYPT.html
quantum
Targets
-
-
Target
b63e94928da25e18caa1506305b9ca3dedc267e747dfa4710860e757d2cc8192
-
Size
75KB
-
MD5
0706764b3963df092079d3bdef787a1f
-
SHA1
73c2460d59f3d0637523ca6d35425aae14358ba1
-
SHA256
b63e94928da25e18caa1506305b9ca3dedc267e747dfa4710860e757d2cc8192
-
SHA512
3af7ff3b2aa689eb4c410562b5ead74ff77417da941521928391c6fac3dcc6a75f6d866f52b12f67a41564cfa81afcda51857c0f208f9e90e8629e0f0b5d5cb4
-
SSDEEP
1536:9aX51pVH9hsgNGLs6BLM1frxz/HTfcKKBaJGp:OfJGLs6BwNxnfTKsG
Score10/10-
Quantum Ransomware
A rebrand of the MountLocker ransomware first seen in August 2021.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-