1.0 Introduction
Qilin Ransomware, also known as Agenda Ransomware, is a highly sophisticated cyber threat group that emerged in 2022 and has since become a significant player in the ransomware landscape. Its name may be inspired by the mythical Chinese creature Qilin, symbolizing adaptability and strength, though the group is believed to originate from Russia. Operating as a Ransomware-as-a-Service (RaaS), Qilin enables affiliates to deploy customized ransomware attacks, making it a versatile and formidable threat. What sets Qilin apart is its use of advanced evasion techniques, cross-platform functionality, and its ability to execute targeted attacks. The ransomware is written in Go (Golang) and Rust programming languages known for their efficiency and cross-platform compatibility allowing it to target both Windows and Linux systems with ease.
The primary objective of Qilin ransomware is financial extortion, achieved by encrypting victims' data and demanding ransom payments. It primarily targets critical industries such as healthcare, finance, education, and manufacturing sectors that rely heavily on sensitive data but often lack strong cybersecurity defences. Qilin is distributed through phishing emails, malicious attachments, and exploit kits, often leveraging unpatched vulnerabilities and weak security configurations to infiltrate systems. The group has compromised over 150 organizations, demonstrating its widespread impact and ability to execute highly damaging ransomware attacks.
2.0 Impact
Qilin Ransomware can have devastating consequences for affected organizations. The primary impact includes data encryption, rendering critical files inaccessible, and causing operational disruptions. Additionally, Qilin operators engage in double extortion, threatening to publish stolen data if the ransom is not paid. This tactic can lead to reputational damage, financial loss, legal repercussions, and compliance violations. The downtime associated with a Qilin attack can be prolonged, affecting business continuity and leading to significant revenue losses.?
3.0 Targets
- Qilin Ransomware primarily targets Windows and Linux-based systems, making it a cross-platform threat.
- Qilin Ransomware targets industrials, professional & commercial services, consumer cyclicals, healthcare, technology, financials and other sectors.
4.0 Technical Details
4.1 Initial Infection
Qilin ransomware typically gains access to systems through multiple attack vectors. One of the most frequent methods involves phishing emails that contain malicious attachments or embedded links. When unsuspecting users open these attachments or click the links, the ransomware payload is downloaded and executed. In addition to phishing, Qilin takes advantage of known vulnerabilities in operating systems and software, exploiting security weaknesses to infiltrate networks. Another commonly used technique is attacking Remote Desktop Protocol (RDP) services, where cybercriminals target misconfigured or weakly secured RDP settings to gain unauthorized access and deploy the ransomware within the system.
4.2 Payload Delivery
After gaining initial access, Qilin ransomware employs sophisticated obfuscation techniques to evade detection. Its code is packed to disguise its true purpose, making it harder to identify through static analysis. Additionally, Qilin utilizes various code obfuscation strategies, including renaming functions, modifying control flows, and encrypting strings, which complicates reverse engineering efforts. These tactics make it difficult to detect the ransomware using traditional Indicators of Compromise (IoCs) found lower on the pyramid of pain.
To further hinder analysis, Qilin integrates anti-analysis mechanisms designed to identify and disable debugging and sandbox environments. It actively scans for virtual machines and common sandbox artifacts to evade dynamic analysis, preventing security researchers from closely examining its behavior. Although Qilin follows a typical ransomware attack chain, its success lies in the effectiveness of its evasion strategies, allowing it to execute attacks while avoiding early detection.
4.3 Execution and Persistence
Once Qilin is successfully deployed, it attempts to escalate its privileges to obtain administrative control over the compromised system. To achieve this, it may exploit system vulnerabilities or leverage legitimate administrative tools like PowerShell and PsExec to gain higher-level access. With elevated privileges, Qilin conducts network reconnaissance to locate additional targets. It systematically scans the network to identify connected systems, shared resources, and active services. Additionally, it engages in credential dumping to extract passwords and authentication credentials, enabling it to spread laterally. By using compromised credentials, Qilin can infiltrate other machines within the network, increasing its reach and impact.
Figure 1: A sample written in Golang uses PsExec for remote execution
4.4 Data Encryption
Qilin ransomware employs a sophisticated encryption process that integrates both symmetric and asymmetric encryption to effectively lock files. Initially, it utilizes symmetric encryption to encrypt the victim’s data using a randomly generated key. To ensure that only the attackers can decrypt the files, this symmetric key is further encrypted with a public RSA key, meaning the corresponding private RSA key—held exclusively by the attackers—is required for decryption.
To maximize damage and increase pressure on victims, Qilin targets a broad range of file types, including documents, databases, and backup files, making data recovery difficult without paying the ransom. However, it deliberately avoids encrypting critical system files to keep the operating system functional. This ensures that the victim can still access the ransom note and follow the attacker's instructions for payment and potential decryption.
Figure 2: Qilin’s recruitment post includes details about it functionalities, the mentioned encryption algorithms are ChaCha20, AES and RSA4096
4.5 Ransom Note and Extortion
Once the encryption process is complete, Qilin places a customized ransom note on the compromised system. This note generally specifies the ransom amount, which is typically demanded in cryptocurrency, along with detailed instructions on how to reach the attackers for payment and file decryption. Additionally, the note often includes threats, warning victims that their stolen data may be leaked or permanently lost if the ransom is not paid within a set deadline.
Figure 3: Sample Qilin’s Ransom Note
4.6 Communication and Payment
Victims are instructed to contact the attackers through Dark Web portals or encrypted messaging platforms, which help maintain the attackers' anonymity and make it difficult for law enforcement to trace communications. Ransom payments are typically required in cryptocurrencies like Bitcoin or Monero, ensuring anonymity and reducing the chances of tracking financial transactions. However, even if the ransom is paid, there is no certainty that the attackers will provide the necessary decryption tools to restore the encrypted data.
Figure 4: Victims are instructed to download the TOR Browser and redirected to their dark web portals
4.7 Clean-up and Cover-up
To evade detection and hinder forensic investigations, Qilin ransomware systematically deletes logs and other traces of its activity. This includes wiping event logs and eliminating temporary files generated during the attack. In some cases, Qilin is also designed to self-delete once its objectives are achieved, making post-incident analysis and response even more challenging for cybersecurity teams.
5.0 Indicators of Compromise (IoCs)
| Type | Indicator |
|---|---|
| MD5 | 64ca549e78ad1bd34abd2834b0f81080 |
| SHA-1 | 493ff413528f752c5fce3ceabd89d2ab37397b86 |
| SHA-256 | 93c16c11ffca4ede29338eac53ca9f7c4fbcf68b8ea85ea5ae91a9e00dc77f01 |
| MD5 | eb6fff4ee0f03ae5191f11570ff221c5 |
| SHA-1 | c2dfbf554e068195ecc40bebd0617ce09ad65784 |
| SHA-256 | 54ff98956c3a0a3bc03a5f43d2c801ebcc1255bed644c78bad55d7f7beebd294 |
| MD5 | 923c5af6fd29158b757fb876979d250b |
| SHA-1 | 6b3e3ff0495d39c85eca41f336bfd5ff92c97412 |
| SHA-256 | 9e1f8165ca3265ef0ff2d479370518a5f3f4467cd31a7b4b006011621a2dd752 |
| MD5 | 31edb01d243e8d989eb7e5aeeeef54dc |
| SHA-1 | 05f60fc706754b317ffc7839a2b0490f7cd6f71d |
| SHA-256 | e4882b8e4e144e983cf003a5c4038043002a004b63c4f0844a15268332597e80 |
| MD5 | a7ab0969bf6641cd0c7228ae95f6d217 |
| SHA-1 | 002971b6d178698bf7930b5b89c201750d80a07e |
| SHA-256 | 117fc30c25b1f28cd923b530ab9f91a0a818925b0b8998bc9a7f820a9e630464 |
| MD5 | 417ad60624345ef85e648038e18902ab |
| SHA-1 | e18ef6975ef8fce97790fb8ae583caad1ec7d5b3 |
| SHA-256 | 555964b2fed3cced4c75a383dd4b3cf02776dae224f4848dcc03510b1de4dbf4 |
| MD5 | e01776ec67b9f1ae780c3e24ecc4bf06 |
| SHA-1 | 3ef805009f8694e78699932563c09ac3b6bc08a5 |
| SHA-256 | 0629cd5e187174cb69f3489675f8c84cc0236f1f1200be384ed6c1a9aa1ce7a1 |
| MD5 | 63b89a42c39b2b56aae433712f96f619 |
| SHA-1 | 50927809fa3f1ec408d7a1715a714831f41160db |
| SHA-256 | bf9fc34ef4734520a1f65c1ec0a91b563bf002ac63982cbd2df10791493e9147 |
| MD5 | d0a711e4a51891ddf00f704d508b1ef2 |
| SHA-1 | d9ea05933353d1f32b18696877a3396140022f03 |
| SHA-256 | cd27a31e618fe93df37603e5ece3352a91f27671ee73bdc8ce9ad793cad72a0f |
| MD5 | 14dec91fdcaab96f51382a43adb84016 |
| SHA-1 | a85d9d2a3913011cd282abc7d9711b2346c23899 |
| SHA-256 | 37546b811e369547c8bd631fa4399730d3bd4aff635e744d83632b74f44f56cf6 |
| MD5 | 88bb8649cb9411a9692f9c8e67ed32c |
| SHA-1 | 82f8060575de96dc4edf4f7b02ec31ba7637fa03 |
| SHA-256 | c26ce932f3609ecd710a3a1ca7f7b96f1b103a11b49a86e9423e03664eaabd40 |
| MD5 | 470d0261d18ed69990ce94f05d940de1 |
| SHA-1 | 890581fca724935118606a4d92dbc206f9eff04c |
| SHA-256 | 411b2ed12df1ace6559d3ea666c672617ce23e2ace06806bb53c55bcccb83303 |
| MD5 | d67303ba66bcb4dd89de87c83f3f831f |
| SHA-1 | 34bfe0c8aa61f90ca03b7e80271d5a8afae0be4b |
| SHA-256 | 8e1eb0ad22236e325387fdb45aea63f318a672c5d035a21d7b3a64eeafb4c5a2 |
| MD5 | 440810b008eed766f085b69b1723f54b |
| SHA-1 | 9692644974071cd484455e355f8d79ce8c486e20 |
| SHA-256 | aa0772fc6784799d59649654879c2b4a23919cda410bede0162751e6d6d6b558 |
| MD5 | 6b7eeb860917aa44982d8bd2d971aff1 |
| SHA-1 | d4e3a066e1c1a21e3d44f2ef81a94aec42f5df11 |
| SHA-256 | ebb2a1b46a13c308ffe62dda4d9da316d550433707b2c2a38ad710ea4456c608 |
| MD5 | a42d36f1af2c396e645ffa356fa47a1e |
| SHA-1 | 5914e976598ece1a271a60615a17420319a77812 |
| SHA-256 | ceed9fdce420c0558e56bb705664d59f67d62c12d7356ca8643908261638b256 |
| MD5 | e1d41939dc4cc4116cc3439a01cfb666 |
| SHA-1 | 6e35dfdf0d09a0313a33fcc6c77f4fe00a79b9dc |
| SHA-256 | 5e9fc42cf65e1a87e953d00cb2755d3b5b00c1414259534c3a85742295bb6ff9 |
| MD5 | 1410b418a078559581725d14fa389cdd |
| SHA-1 | 081cd6c242d472db9148fd0ce33346f7a3e87ac2 |
| SHA-256 | a25097d2ae808df410c2f35d725a500fb680f38605e62c9e3b619e389ef6733f |
File Names
| Type | Indicator |
|---|---|
| File Name | decryptor_399060b2.exe |
| File Name | enc.exe |
| File Name | 8e1eb0ad22236e325387fdb45aea63f318a672c5d035a21d7b3a64eeafb4c5a2 |
| File Name | 555964b2fed3cced4c75a383dd4b3cf02776dae224f4848dcc03510b1de4dbf4.elf |
| File Name | 99.dll |
| File Name | update.exe |
| File Name | inter.exe |
| File Name | ceed9fdce420c0558e56bb705664d59f67d62c12d7356ca864390826 |
| File Name | e1d41939dc4cc4116cc3439a01cfb666 |
| File Name | BackupsFrst.exe1 |
| File Name | 2023-12-15_63b89a42c39b2b56aae433712f96f619_revil |
| File Name | update.exe |
| File Name | 31edb01d243e8d989eb7e5aeeeef54dc.virus |
| File Name | 2023-11-14_d0a711e4a51891ddf00f704d508b1ef2_revil |
| File Name | 0629cd5e187174cb69f3489675f8c84cc0236f11f200be384ed6c1a9aa1ce7a1.elf |
| File Name | c26ce932f3609ecd710a3a1ca7f7b96f1b103a11b49a86e9423e03664eaabd40.dll |
| File Name | 55ee6bb3deb3385052d7f57e6a48c3c5bba0f558f0d17653908550ffe37e1bea |
| File Name | 37546b811e369547c8bd631fa4399730d3bdaff635e744d83632b74f44f56cf6.exe |
| File Name | enc.exe |
Detection Names
| Detection Name | Vendor |
|---|---|
| Gen:Variant.Ransom.Agenda.1 | BitDefender |
| Gen:Variant.Ransom.Agenda.1 (B) | Emsisoft |
| W32/QilinCrypt!tr.ransom | Fortinet |
| HEUR:Trojan-Ransom.Linux.Qilin.a | Kaspersky |
| Trojan:Win64/AgendaGoLauncher.A!dha | Microsoft |
| Ransom:Win32/QilinCrypt.PA!MTB | Microsoft |
| Ransom:Win32/Qilin.MA!MTB | Microsoft |
| Ransom:Linux/Qilin.A!MTB | Microsoft |
| Ransom.Qilin | Symantec |
| Gen:Variant.Ransom.Agenda.1 | Trellix (FireEye) |
| Trojan.Win64.AGENDA.SVT | Trend Micro |
| Ransom.Win32.AGENDA.SMYXDL | Trend Micro |
| Ransom.Win32.AGENDA.YXECJT | Trend Micro |
| Ransom.Linux.AGENDA.YXDLOT | Trend Micro |
| Ransom.Win32.AGENDA.THIAIBB | Trend Micro |
| Ransom.Win32.QILIN.R002C0XK523 | Trend Micro |
| HEUR:Trojan-Ransom.Linux.Qilin.a | ZoneAlarm by Check Point |
6.0 MITRE ATT&CK Framework
| Tactic | Technique | ID |
|---|---|---|
| Initial Access | Valid Accounts | T1078 |
| Phishing | T1566 | |
| Spearphishing Attachment | T1566.001 | |
| Spearphishing Link | T1566.002 | |
| Exploit Public-Facing Application | T1190 | |
| Execution | Scheduled Task/Job | T1053 |
| Command and Scripting Interpreter | T1059.003 | |
| PowerShell | T1059.001 | |
| Persistence | Boot or Logon Initialization Scripts | T1037 |
| Privilege Escalation | Exploitation of Vulnerabilities | T1068 |
| Abuse Elevation Control Mechanism | T1548 | |
| Defense Evasion | Process Injection | T1055 |
| Rootkit | T1014 | |
| Exploitation for Defense Evasion | T1211 | |
| Execution Guardrails | T1480 | |
| Virtualization/Sandbox Evasion | T1497 | |
| Obfuscated Files or Information | T1027 | |
| Credential Access | OS Credential Dumping, LSASS Memory | T1003, T1003.001 |
| Discovery | System Information Discovery | T1082 |
| Application Window Discovery | T1010 | |
| Network Service Scanning | T1046 | |
| Remote System Discovery | T1018 | |
| Lateral Movement | Remote Services, Remote Desktop Protocol, SSH | T1021, T1021.001, T1021.004 |
| Lateral Tool Transfer | T1570 | |
| Execution | System Services: Service Execution | T1569.002 |
| Collection | Data from Local System | T1005 |
| Exfiltration | Exfiltration Over Other Network Medium, Bluetooth | T1011, T1011.001 |
| Command and Control | Data Obfuscation, Junk Data | T1001, T1001.001 |
| Impact | Data Encrypted for Impact | T1486 |
| Data Destruction | T1485 | |
| Inhibit System Recovery | T1490 | |
| Disk Wipe | T1561.001 |
7.0 Recommendations
CyberSecurity Malaysia recommends that system administrators review this advisory and implement the mitigations recommended below for immediate protection against Qilin Ransomware and other ransomware incidents.
7.1 Recommendations for System Administrators:
- Implement recovery plan to maintain and retain multiple copies of sensitive and proprietary data and servers in a physically separate, segmented and securelocation.
- Organisations must proactively monitor and screen for compromised credentials potentially due to Qilin infection. Hence, compromised credentials must be immediately rectified by changing the passwords to strong passwords.
- Implementing password revocation to enforce password changing.
- Encourage employees to use secure password managers and longer passphrases, avoid using the same password for multiple accounts and set reminders to change passwords after several months.
- Use multi-factor authentication to identify and protect the businesses' critical assets and access to critical information systems.
- Restrict access authorisations according to user roles and develop authorisation policy to secure idle accounts; automatically lock accounts and alert IT staff after several failed login attempts.
- Review Active Directory (AD) to locate and close existing backdoors, such as compromised service accounts, which often have administrative privileges and are often targeted by attackers who aim to steal credentials.
- Keep all operating systems, software and firmware up-to-date and patched regularly.
- Perform Data backups daily and test regularly. Place backup copies in a remote location.
- Enforce phishing-resistant multifactor authentication to administrator accounts.
- Segment networks to prevent the spread of ransomware, which helps to restrict adversary lateral movement.
- Install, regularly update and enable real-time detection for anti-virus software on all hosts.
- Review domain controllers, servers, workstations, and active directories for new and/or unrecognised accounts.
- Maintain offline backups of data and regularly maintain backup and restoration. Ensure all backup data is encrypted
- IS awareness training should be conducted for all staff at least once a year.
- Do not download suspicious files from an unknown sender.
- Conduct Disaster Recovery Plan review and update, if necessary.
- Conduct Business Continuity Plan review and update, if necessary.
7.2 Recommendations for Internet Users:
- Users should use strong and unique passwords.
- Users should use secure passwords for the network.
- Users should be wary of phishing attempts and not simply click on any links or executables they receive via social media and other messaging applications.
- Users should practice safe browsing and regularly back up data.
- Users should download software or applications from reputable sources.
- Users should be wary and suspicious of applications circulated on social media for downloads.
- Enable and use up-to-date anti-virus software.
- Do regular security updates and patches.
- Contact relevant authorities such as CyberSecurity Malaysia for inquiries and assistance related to cyber threats or suspicious activities users observe online
- Users are also encouraged to report to the Service Providers or the social media platform concerning the circulation of posts or ads with suspicious links.
Generally, CyberSecurity Malaysia advises the users of these devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
To report an incident and for further enquiries, please contact the Cyber999 Incident Response Centre through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:30 MYT
Web: https://www.mycert.org.my
8.0 References
- https://socradar.io/dark-web-profile-qilin-agenda-ransomware/
- https://www.group-ib.com/blog/qilin-revisited/
- https://www.hhs.gov/sites/default/files/qilin-threat-profile-tlpclear.pdf
- https://blackpointcyber.com/wp-content/uploads/2024/08/Qilin-Ransomware-Threat-Profile_Adversary-Pursuit-Group-Blackpoint-Cyber_2024Q3.pdf
- https://www.tripwire.com/state-of-security/qilin-ransomware-what-you-need-know
- https://www.picussecurity.com/resource/blog/qilin-ransomware