Qilin ransomware is a Ransomware-as-a-Service (RaaS) that has been active since at least 2022 with versions written in Golang and Rust that are capable of targeting Windows or VMWare ESXi devices. Qilin shares functionality overlaps with Black Basta, REvil, and BlackCat ransomware and its RaaS affiliates have been observed targeting multiple sectors worldwide, including healthcare and education in Asia, Europe, and Africa. [1][2][3][4]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1548 | .002 | Abuse Elevation Control Mechanism: Bypass User Account Control |
Qilin can bypass standard user access controls by using stolen tokens to launch processes at an elevated security context.[5] |
| Enterprise | T1134 | Access Token Manipulation |
Qilin can use an embedded Mimikatz module for token manipulation.[5] |
|
| Enterprise | T1087 | .001 | Account Discovery: Local Account |
Qilin can list all local users found on a targeted system.[1] |
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Qilin has created a runonce autostart entry at |
| .004 | Boot or Logon Autostart Execution: Winlogon Helper DLL | |||
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Qilin has been deployed on VMware vCenter and ESXi servers via custom PowerShell script.[3][5] |
| Enterprise | T1486 | Data Encrypted for Impact |
Qilin can use AES-256 or ChaCha20 for domain-wide encryption of victim servers and workstations and RSA-4096 or RSA-2048 to secure generated encryption keys.[1][2][5][3][6][7] |
|
| Enterprise | T1491 | .001 | Defacement: Internal Defacement |
Qilin can set the wallpaper on compromised hosts to display a ransom message.[4] |
| Enterprise | T1484 | .001 | Domain or Tenant Policy Modification: Group Policy Modification |
Qilin has pushed a scheduled task via a Group Policy Object for payload execution.[1][3] |
| Enterprise | T1480 | Execution Guardrails |
Qilin can require a specific password to be passed by command-line argument during execution which must match a pre-defined value in the configuration in order for it to continue execution.[5] |
|
| .002 | Mutual Exclusion |
Qilin can create a mutex to insure only one instance is running.[6] |
||
| Enterprise | T1190 | Exploit Public-Facing Application |
Qilin has been delivered through exploitation of exposed applications and interfaces including Citrix and RDP.[2] |
|
| Enterprise | T1083 | File and Directory Discovery |
Qilin can exclude specific directories and files from encryption.[1] |
|
| Enterprise | T1222 | File and Directory Permissions Modification |
Qilin can use symbolic links to redirect file paths for both remote and local objects.[5] |
|
| Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Qilin can terminate antivirus-related processes and services.[1][2][6][5] |
| .009 | Impair Defenses: Safe Mode Boot |
Qilin can reboot targeted systems in safe mode to help avoid detection.[1][3] |
||
| Enterprise | T1070 | .001 | Indicator Removal: Clear Windows Event Logs | |
| .004 | Indicator Removal: File Deletion |
Qilin can delete itself from infected hosts after execution.[6][4] |
||
| Enterprise | T1490 | Inhibit System Recovery |
Qilin can execute |
|
| Enterprise | T1680 | Local Storage Discovery |
Qilin has used |
|
| Enterprise | T1112 | Modify Registry |
Qilin can make Registry modifications to share networked drives between elevated and non-elevated processes and to increase the number of outstanding network requests per client.[6][5] |
|
| Enterprise | T1106 | Native API |
Qilin can attempt to log on to the local computer via |
|
| Enterprise | T1135 | Network Share Discovery | ||
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
Qilin can employ several code obfuscation methods, including renaming functions, altering control flows, and encrypting strings.[7] |
| Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
Qilin can employ an embedded Mimikatz module to dump LSASS memory.[5] |
| Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
Qilin has been delivered to victims through malicious email attachments.[2] |
| .002 | Phishing: Spearphishing Link |
Qilin has been delivered via malicious links in spearphishing emails.[2][4] |
||
| Enterprise | T1057 | Process Discovery |
Qilin can define specific processes to be terminated or left alone at execution.[1][2][6][7] |
|
| Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection |
Qilin can inject pwndll.dll, a patched DLL from the legitimate DLL WICloader.dll, into svchost.exe for continuous execution.[1] |
| Enterprise | T1012 | Query Registry |
Qilin can check |
|
| Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares |
Qilin can embed a copy of PsExec within its payload and place it in the %Temp% directory under a randomly generated filename.[5] |
| Enterprise | T1018 | Remote System Discovery |
Qilin can enumerate domain-connected hosts during its discovery phase.[5][4] |
|
| Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
Qilin has pushed scheduled tasks via GPO for execution.[3][1] |
| Enterprise | T1489 | Service Stop |
Qilin can terminate specific services on compromised hosts.[1][6][7] |
|
| Enterprise | T1016 | System Network Configuration Discovery |
Qilin can accept a command line argument identifying specific IPs.[1] |
|
| Enterprise | T1007 | System Service Discovery |
Qilin can identify specific services for termination or to be left running at execution.[1][2][7] |
|
| Enterprise | T1529 | System Shutdown/Reboot |
Qilin can initiate a reboot of the backup server to hinder recovery.[5] |
|
| Enterprise | T1204 | .001 | User Execution: Malicious Link |
Qilin has been executed by luring victims into clicking links in spearphishing emails.[2][4] |
| .002 | User Execution: Malicious File |
Qilin has been delivered to victims through spearphishing emails with malicious attachments.[2] |
||
| Enterprise | T1673 | Virtual Machine Discovery | ||
| ID | Name | References |
|---|---|---|
| G1036 | Moonstone Sleet |
Moonstone Sleet has deployed Qilin ransomware.[8] |
| G1050 | Water Galura |
Water Galura are the operators of the Qilin RaaS.[3] |