Cyber999 Advisories

30 March 2025     Advisory

MA-1300.032025: MyCERT Advisory - Qilin Ransomware


1.0 Introduction
Qilin Ransomware, also known as Agenda Ransomware, is a highly sophisticated cyber threat group that emerged in 2022 and has since become a significant player in the ransomware landscape. Its name may be inspired by the mythical Chinese creature Qilin, symbolizing adaptability and strength, though the group is believed to originate from Russia. Operating as a Ransomware-as-a-Service (RaaS), Qilin enables affiliates to deploy customized ransomware attacks, making it a versatile and formidable threat. What sets Qilin apart is its use of advanced evasion techniques, cross-platform functionality, and its ability to execute targeted attacks. The ransomware is written in Go (Golang) and Rust programming languages known for their efficiency and cross-platform compatibility allowing it to target both Windows and Linux systems with ease.

The primary objective of Qilin ransomware is financial extortion, achieved by encrypting victims' data and demanding ransom payments. It primarily targets critical industries such as healthcare, finance, education, and manufacturing sectors that rely heavily on sensitive data but often lack strong cybersecurity defences. Qilin is distributed through phishing emails, malicious attachments, and exploit kits, often leveraging unpatched vulnerabilities and weak security configurations to infiltrate systems. The group has compromised over 150 organizations, demonstrating its widespread impact and ability to execute highly damaging ransomware attacks.

2.0 Impact
Qilin Ransomware can have devastating consequences for affected organizations. The primary impact includes data encryption, rendering critical files inaccessible, and causing operational disruptions. Additionally, Qilin operators engage in double extortion, threatening to publish stolen data if the ransom is not paid. This tactic can lead to reputational damage, financial loss, legal repercussions, and compliance violations. The downtime associated with a Qilin attack can be prolonged, affecting business continuity and leading to significant revenue losses.?

3.0 Targets

  • Qilin Ransomware primarily targets Windows and Linux-based systems, making it a cross-platform threat. 
  • Qilin Ransomware targets industrials, professional & commercial services, consumer cyclicals, healthcare, technology, financials and other sectors.


4.0 Technical Details
4.1 Initial Infection
Qilin ransomware typically gains access to systems through multiple attack vectors. One of the most frequent methods involves phishing emails that contain malicious attachments or embedded links. When unsuspecting users open these attachments or click the links, the ransomware payload is downloaded and executed. In addition to phishing, Qilin takes advantage of known vulnerabilities in operating systems and software, exploiting security weaknesses to infiltrate networks. Another commonly used technique is attacking Remote Desktop Protocol (RDP) services, where cybercriminals target misconfigured or weakly secured RDP settings to gain unauthorized access and deploy the ransomware within the system.

4.2 Payload Delivery
After gaining initial access, Qilin ransomware employs sophisticated obfuscation techniques to evade detection. Its code is packed to disguise its true purpose, making it harder to identify through static analysis. Additionally, Qilin utilizes various code obfuscation strategies, including renaming functions, modifying control flows, and encrypting strings, which complicates reverse engineering efforts. These tactics make it difficult to detect the ransomware using traditional Indicators of Compromise (IoCs) found lower on the pyramid of pain.

To further hinder analysis, Qilin integrates anti-analysis mechanisms designed to identify and disable debugging and sandbox environments. It actively scans for virtual machines and common sandbox artifacts to evade dynamic analysis, preventing security researchers from closely examining its behavior. Although Qilin follows a typical ransomware attack chain, its success lies in the effectiveness of its evasion strategies, allowing it to execute attacks while avoiding early detection.

4.3 Execution and Persistence
Once Qilin is successfully deployed, it attempts to escalate its privileges to obtain administrative control over the compromised system. To achieve this, it may exploit system vulnerabilities or leverage legitimate administrative tools like PowerShell and PsExec to gain higher-level access. With elevated privileges, Qilin conducts network reconnaissance to locate additional targets. It systematically scans the network to identify connected systems, shared resources, and active services. Additionally, it engages in credential dumping to extract passwords and authentication credentials, enabling it to spread laterally. By using compromised credentials, Qilin can infiltrate other machines within the network, increasing its reach and impact.


Figure 1: A sample written in Golang uses PsExec for remote execution

4.4 Data Encryption
Qilin ransomware employs a sophisticated encryption process that integrates both symmetric and asymmetric encryption to effectively lock files. Initially, it utilizes symmetric encryption to encrypt the victim’s data using a randomly generated key. To ensure that only the attackers can decrypt the files, this symmetric key is further encrypted with a public RSA key, meaning the corresponding private RSA key—held exclusively by the attackers—is required for decryption.

To maximize damage and increase pressure on victims, Qilin targets a broad range of file types, including documents, databases, and backup files, making data recovery difficult without paying the ransom. However, it deliberately avoids encrypting critical system files to keep the operating system functional. This ensures that the victim can still access the ransom note and follow the attacker's instructions for payment and potential decryption.


Figure 2: Qilin’s recruitment post includes details about it functionalities, the mentioned encryption algorithms are ChaCha20, AES and RSA4096

4.5 Ransom Note and Extortion
Once the encryption process is complete, Qilin places a customized ransom note on the compromised system. This note generally specifies the ransom amount, which is typically demanded in cryptocurrency, along with detailed instructions on how to reach the attackers for payment and file decryption. Additionally, the note often includes threats, warning victims that their stolen data may be leaked or permanently lost if the ransom is not paid within a set deadline.


Figure 3: Sample Qilin’s Ransom Note

4.6 Communication and Payment
Victims are instructed to contact the attackers through Dark Web portals or encrypted messaging platforms, which help maintain the attackers' anonymity and make it difficult for law enforcement to trace communications. Ransom payments are typically required in cryptocurrencies like Bitcoin or Monero, ensuring anonymity and reducing the chances of tracking financial transactions. However, even if the ransom is paid, there is no certainty that the attackers will provide the necessary decryption tools to restore the encrypted data.


Figure 4: Victims are instructed to download the TOR Browser and redirected to their dark web portals 

4.7 Clean-up and Cover-up
To evade detection and hinder forensic investigations, Qilin ransomware systematically deletes logs and other traces of its activity. This includes wiping event logs and eliminating temporary files generated during the attack. In some cases, Qilin is also designed to self-delete once its objectives are achieved, making post-incident analysis and response even more challenging for cybersecurity teams.

5.0 Indicators of Compromise (IoCs)

Type Indicator
MD5 64ca549e78ad1bd34abd2834b0f81080
SHA-1 493ff413528f752c5fce3ceabd89d2ab37397b86
SHA-256 93c16c11ffca4ede29338eac53ca9f7c4fbcf68b8ea85ea5ae91a9e00dc77f01
MD5 eb6fff4ee0f03ae5191f11570ff221c5
SHA-1 c2dfbf554e068195ecc40bebd0617ce09ad65784
SHA-256 54ff98956c3a0a3bc03a5f43d2c801ebcc1255bed644c78bad55d7f7beebd294
MD5 923c5af6fd29158b757fb876979d250b
SHA-1 6b3e3ff0495d39c85eca41f336bfd5ff92c97412
SHA-256 9e1f8165ca3265ef0ff2d479370518a5f3f4467cd31a7b4b006011621a2dd752
MD5 31edb01d243e8d989eb7e5aeeeef54dc
SHA-1 05f60fc706754b317ffc7839a2b0490f7cd6f71d
SHA-256 e4882b8e4e144e983cf003a5c4038043002a004b63c4f0844a15268332597e80
MD5 a7ab0969bf6641cd0c7228ae95f6d217
SHA-1 002971b6d178698bf7930b5b89c201750d80a07e
SHA-256 117fc30c25b1f28cd923b530ab9f91a0a818925b0b8998bc9a7f820a9e630464
MD5 417ad60624345ef85e648038e18902ab
SHA-1 e18ef6975ef8fce97790fb8ae583caad1ec7d5b3
SHA-256 555964b2fed3cced4c75a383dd4b3cf02776dae224f4848dcc03510b1de4dbf4
MD5 e01776ec67b9f1ae780c3e24ecc4bf06
SHA-1 3ef805009f8694e78699932563c09ac3b6bc08a5
SHA-256 0629cd5e187174cb69f3489675f8c84cc0236f1f1200be384ed6c1a9aa1ce7a1
MD5 63b89a42c39b2b56aae433712f96f619
SHA-1 50927809fa3f1ec408d7a1715a714831f41160db
SHA-256 bf9fc34ef4734520a1f65c1ec0a91b563bf002ac63982cbd2df10791493e9147
MD5 d0a711e4a51891ddf00f704d508b1ef2
SHA-1 d9ea05933353d1f32b18696877a3396140022f03
SHA-256 cd27a31e618fe93df37603e5ece3352a91f27671ee73bdc8ce9ad793cad72a0f
MD5 14dec91fdcaab96f51382a43adb84016
SHA-1 a85d9d2a3913011cd282abc7d9711b2346c23899
SHA-256 37546b811e369547c8bd631fa4399730d3bd4aff635e744d83632b74f44f56cf6
MD5 88bb8649cb9411a9692f9c8e67ed32c
SHA-1 82f8060575de96dc4edf4f7b02ec31ba7637fa03
SHA-256 c26ce932f3609ecd710a3a1ca7f7b96f1b103a11b49a86e9423e03664eaabd40
MD5 470d0261d18ed69990ce94f05d940de1
SHA-1 890581fca724935118606a4d92dbc206f9eff04c
SHA-256 411b2ed12df1ace6559d3ea666c672617ce23e2ace06806bb53c55bcccb83303
MD5 d67303ba66bcb4dd89de87c83f3f831f
SHA-1 34bfe0c8aa61f90ca03b7e80271d5a8afae0be4b
SHA-256 8e1eb0ad22236e325387fdb45aea63f318a672c5d035a21d7b3a64eeafb4c5a2
MD5 440810b008eed766f085b69b1723f54b
SHA-1 9692644974071cd484455e355f8d79ce8c486e20
SHA-256 aa0772fc6784799d59649654879c2b4a23919cda410bede0162751e6d6d6b558
MD5 6b7eeb860917aa44982d8bd2d971aff1
SHA-1 d4e3a066e1c1a21e3d44f2ef81a94aec42f5df11
SHA-256 ebb2a1b46a13c308ffe62dda4d9da316d550433707b2c2a38ad710ea4456c608
MD5 a42d36f1af2c396e645ffa356fa47a1e
SHA-1 5914e976598ece1a271a60615a17420319a77812
SHA-256 ceed9fdce420c0558e56bb705664d59f67d62c12d7356ca8643908261638b256
MD5 e1d41939dc4cc4116cc3439a01cfb666
SHA-1 6e35dfdf0d09a0313a33fcc6c77f4fe00a79b9dc
SHA-256 5e9fc42cf65e1a87e953d00cb2755d3b5b00c1414259534c3a85742295bb6ff9
MD5 1410b418a078559581725d14fa389cdd
SHA-1 081cd6c242d472db9148fd0ce33346f7a3e87ac2
SHA-256 a25097d2ae808df410c2f35d725a500fb680f38605e62c9e3b619e389ef6733f

File Names

Type Indicator
File Name decryptor_399060b2.exe
File Name enc.exe
File Name 8e1eb0ad22236e325387fdb45aea63f318a672c5d035a21d7b3a64eeafb4c5a2
File Name  555964b2fed3cced4c75a383dd4b3cf02776dae224f4848dcc03510b1de4dbf4.elf
File Name  99.dll
File Name  update.exe
File Name  inter.exe
File Name  ceed9fdce420c0558e56bb705664d59f67d62c12d7356ca864390826
File Name  e1d41939dc4cc4116cc3439a01cfb666
File Name  BackupsFrst.exe1
File Name  2023-12-15_63b89a42c39b2b56aae433712f96f619_revil
File Name  update.exe
File Name  31edb01d243e8d989eb7e5aeeeef54dc.virus
File Name  2023-11-14_d0a711e4a51891ddf00f704d508b1ef2_revil
File Name  0629cd5e187174cb69f3489675f8c84cc0236f11f200be384ed6c1a9aa1ce7a1.elf
File Name  c26ce932f3609ecd710a3a1ca7f7b96f1b103a11b49a86e9423e03664eaabd40.dll
File Name  55ee6bb3deb3385052d7f57e6a48c3c5bba0f558f0d17653908550ffe37e1bea
File Name  37546b811e369547c8bd631fa4399730d3bdaff635e744d83632b74f44f56cf6.exe
File Name  enc.exe

Detection Names

Detection Name Vendor
Gen:Variant.Ransom.Agenda.1 BitDefender
Gen:Variant.Ransom.Agenda.1 (B) Emsisoft
W32/QilinCrypt!tr.ransom Fortinet
HEUR:Trojan-Ransom.Linux.Qilin.a Kaspersky
Trojan:Win64/AgendaGoLauncher.A!dha Microsoft
Ransom:Win32/QilinCrypt.PA!MTB Microsoft
Ransom:Win32/Qilin.MA!MTB Microsoft
Ransom:Linux/Qilin.A!MTB Microsoft
Ransom.Qilin Symantec
Gen:Variant.Ransom.Agenda.1 Trellix (FireEye)
Trojan.Win64.AGENDA.SVT Trend Micro
Ransom.Win32.AGENDA.SMYXDL Trend Micro
Ransom.Win32.AGENDA.YXECJT Trend Micro
Ransom.Linux.AGENDA.YXDLOT Trend Micro
Ransom.Win32.AGENDA.THIAIBB Trend Micro
Ransom.Win32.QILIN.R002C0XK523 Trend Micro
HEUR:Trojan-Ransom.Linux.Qilin.a ZoneAlarm by Check Point


6.0 MITRE ATT&CK Framework

Tactic Technique ID
Initial Access Valid Accounts T1078
Phishing T1566
Spearphishing Attachment T1566.001
Spearphishing Link T1566.002
Exploit Public-Facing Application T1190
Execution Scheduled Task/Job T1053
Command and Scripting Interpreter T1059.003
PowerShell T1059.001
Persistence Boot or Logon Initialization Scripts T1037
Privilege Escalation Exploitation of Vulnerabilities T1068
Abuse Elevation Control Mechanism T1548
Defense Evasion Process Injection T1055
Rootkit T1014
Exploitation for Defense Evasion T1211
Execution Guardrails T1480
Virtualization/Sandbox Evasion T1497
Obfuscated Files or Information T1027
Credential Access OS Credential Dumping, LSASS Memory T1003, T1003.001
Discovery System Information Discovery T1082
Application Window Discovery T1010
Network Service Scanning T1046
Remote System Discovery T1018
Lateral Movement Remote Services, Remote Desktop Protocol, SSH T1021, T1021.001, T1021.004
Lateral Tool Transfer T1570
Execution System Services: Service Execution T1569.002
Collection Data from Local System T1005
Exfiltration Exfiltration Over Other Network Medium, Bluetooth T1011, T1011.001
Command and Control Data Obfuscation, Junk Data T1001, T1001.001
Impact Data Encrypted for Impact T1486
Data Destruction T1485
Inhibit System Recovery T1490
Disk Wipe T1561.001


7.0 Recommendations
CyberSecurity Malaysia recommends that system administrators review this advisory and implement the mitigations recommended below for immediate protection against Qilin Ransomware and other ransomware incidents. 

7.1 Recommendations for System Administrators:

  1. Implement recovery plan to maintain and retain multiple copies of sensitive and proprietary data and servers in a physically separate, segmented and securelocation.
  2. Organisations must proactively monitor and screen for compromised credentials potentially due to Qilin infection. Hence, compromised credentials must be immediately rectified by changing the passwords to strong passwords. 
  3. Implementing password revocation to enforce password changing.
  4. Encourage employees to use secure password managers and longer passphrases, avoid using the same password for multiple accounts and set reminders to change passwords after several months.
  5. Use multi-factor authentication to identify and protect the businesses' critical assets and access to critical information systems.
  6. Restrict access authorisations according to user roles and develop authorisation policy to secure idle accounts; automatically lock accounts and alert IT staff after several failed login attempts.
  7. Review Active Directory (AD) to locate and close existing backdoors, such as compromised service accounts, which often have administrative privileges and are often targeted by attackers who aim to steal credentials.
  8. Keep all operating systems, software and firmware up-to-date and patched regularly.
  9. Perform Data backups daily and test regularly. Place backup copies in a remote location.
  10. Enforce phishing-resistant multifactor authentication to administrator accounts.
  11. Segment networks to prevent the spread of ransomware, which helps to restrict adversary lateral movement.
  12. Install, regularly update and enable real-time detection for anti-virus software on all hosts.
  13. Review domain controllers, servers, workstations, and active directories for new and/or unrecognised accounts.
  14. Maintain offline backups of data and regularly maintain backup and restoration. Ensure all backup data is encrypted
  15. IS awareness training should be conducted for all staff at least once a year.
  16. Do not download suspicious files from an unknown sender.
  17. Conduct Disaster Recovery Plan review and update, if necessary.
  18. Conduct Business Continuity Plan review and update, if necessary.

 
7.2 Recommendations for Internet Users:

  1. Users should use strong and unique passwords.
  2. Users should use secure passwords for the network.
  3. Users should be wary of phishing attempts and not simply click on any links or executables they receive via social media and other messaging applications.
  4. Users should practice safe browsing and regularly back up data.
  5. Users should download software or applications from reputable sources.
  6. Users should be wary and suspicious of applications circulated on social media for downloads.
  7. Enable and use up-to-date anti-virus software.
  8. Do regular security updates and patches.
  9. Contact relevant authorities such as CyberSecurity Malaysia for inquiries and assistance related to cyber threats or suspicious activities users observe online
  10. Users are also encouraged to report to the Service Providers or the social media platform concerning the circulation of posts or ads with suspicious links.

Generally, CyberSecurity Malaysia advises the users of these devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

To report an incident and for further enquiries, please contact the Cyber999 Incident Response Centre through the following channels:

E-mail: cyber999[at]cybersecurity.my 
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting) 
Business Hours: Mon - Fri 08:30 -17:30 MYT 
Web:  https://www.mycert.org.my  

8.0 References

logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • enquiry@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed