• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Update – Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure – Russian-Ukrainian Cyber Warfare
April 27, 2022
Rewterz Threat Alert – RedLine Stealer – Active IOCs
April 27, 2022

Rewterz Threat Alert – Quantum Ransomware – Active IOCs

April 27, 2022

Severity

High

Analysis Summary

In August 2021, Quantum Ransomware was identified for the first time. One of the first access vectors used by the threat actors is the IcedID virus, which uses Cobalt Strike for remote access and leads to data theft and encryption using Quantum Locker. Using phishing emails with an ISO file attached, IcedID gained initial access to the target’s PC. To get beyond email security restrictions, IcedID and ISO archive are a fantastic combination. Cobalt Strike was injected two hours after the infection had begun. Threat actors eventually employed WMI and PsExec to encrypt machines and deploy the Quantum ransomware payload. The attack was completed in less than four hours, which is extremely impressive.

Impact

  • Unauthorized Access
  • Data Exfiltration
  • File Encryption

Indicators Of Compromise

MD5

  • e051009b12b37c7ee16e810c135f1fef
  • 4a6ceabb2ce1b486398c254a5503b792
  • adf0907a6114c2b55349c08251efdf50
  • 49513b3b8809312d34bb09bd9ea3eb46
  • 350f82de99b8696fea6e189fcd4ca454

SHA-256

  • 5bc00ad792d4ddac7d8568f98a717caff9d5ef389ed355a15b892cc10ab2887b
  • 4a76a28498b7f391cdc2be73124b4225497232540247ca3662abd9ab2210be36
  • 3bb2f8c2d2d1c8da2a2051bd9621099689c5cd0a6b12aa8cb5739759e843e5e6
  • 6f6f71fa3a83da86d2aba79c92664d335acb9d581646fa6e30c35e76cf61cbb7
  • 84f016ece77ddd7d611ffc0cbb2ce24184aeee3a2fdbb9d44d0837bc533ba238
  • c140ae0ae0d71c2ebaf956c92595560e8883a99a3f347dfab2a886a8fb00d4d3

SHA-1

  • 415b27cd03d3d701a202924c26d25410ea0974d7
  • 08a1c43bd1c63bbea864133d2923755aa2f74440
  • aa25ae2f9dbe514169f4526ef4a61c1feeb1386a
  • 445294080bf3f58e9aaa3c9bcf1f346bc9b1eccb
  • deea45010006c8bde12a800d73475a5824ca2e6f

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.