General
-
Target
b3da47207fbc6087f87f5d09aea32be664e399b0328bc05e520cb4ef567fb994
-
Size
163KB
-
Sample
230301-vnkcmagg4v
-
MD5
4f497663f23fb2e6b46db9ffa70f6030
-
SHA1
68dfd51dfa1e66ec673f3adda08469f4c88c93a0
-
SHA256
b3da47207fbc6087f87f5d09aea32be664e399b0328bc05e520cb4ef567fb994
-
SHA512
6cf9e7d702a0317a7116b191bcca277ab77d132ee7f2103b663c8765be796acbf88225a7c08dd2c2ea734e352761896fb0ba78c69fd0fddfd87848ef84c548c2
-
SSDEEP
3072:bSxWUhHeCib5w3khnewRkQCjK8UINPrH/ACTcVYH6i/hsyFHay24zPc:e1HeCidmk0wArH/PptnFjzU
Static task
static1
Behavioral task
behavioral1
Sample
sample.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.dll
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
http://obqregdsd7dmilzf3aqvegn3sofpufsvb2n3m2dvwfhsgthemvyi44qd.onion/?cid=207aa5c60e08117ba86c113b3ff9e298662fcbb016c5a26f799ece0677a89f56
Extracted
C:\Users\Admin\3D Objects\README_TO_DECRYPT.html
quantum
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
http://obqregdsd7dmilzf3aqvegn3sofpufsvb2n3m2dvwfhsgthemvyi44qd.onion/?cid=207aa5c60e08117ba86c113b3ff9e2987d38d8be08c6a461799ece0677a89f56
Targets
-
-
Target
sample
-
Size
365KB
-
MD5
4401c2782092881cd54018f1381b1521
-
SHA1
8e96e2c9f1ade2a762c839e5dd6d2c6beb576363
-
SHA256
6606dac5b89e76be4d85a85bdd8cb5f6c13c0fc887a3c0072d064713932a23f4
-
SHA512
4c383a6901ba719fd15d56ba6b40f1cd0dc5f2e20eae9cadd2d477f8f16262a0f8fca3a4ca20227a02d5eb086a774ba0783b3dcaf019bbe09ff21a3182b2b0d9
-
SSDEEP
6144:Rtht/U8T6AOHdt8lIJASVO30UFimXNxtipVO30UFimXNxtiH:/wValD/30Wietia30Wieti
Score10/10-
Quantum Ransomware
A rebrand of the MountLocker ransomware first seen in August 2021.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops desktop.ini file(s)
-