Malware & RansomwareHIGH

Qilin Ransomware - Analyzing the EDR Killer Infection Chain

Featured image for Qilin Ransomware - Analyzing the EDR Killer Infection Chain
TACisco Talos Intelligence
Qilin ransomwaremsimg32.dllEDR bypassmalicious DLLTakahiro Takeda
🎯

Basically, Qilin ransomware uses a tricky file to disable security tools on computers.

Quick Summary

A new analysis reveals the malicious 'msimg32.dll' used in Qilin ransomware attacks targeting EDR systems. This sophisticated malware can disable over 300 EDR solutions, posing a significant risk. Understanding its mechanisms is crucial for cybersecurity defenses.

What Happened

The Qilin ransomware has introduced a sophisticated malware component known as msimg32.dll, which is part of a multi-stage infection chain specifically designed to disable Endpoint Detection and Response (EDR) systems. This malicious DLL can terminate over 300 different EDR drivers from various vendors, making it a significant threat to cybersecurity.

How It Works

The infection begins with a PE loader that prepares the environment for the EDR killer component. This loader executes advanced evasion techniques, such as neutralizing user-mode hooks and suppressing Event Tracing for Windows (ETW) event generation. By leveraging Structured Exception Handling (SEH) and Vectored Exception Handling (VEH), the malware can obscure its control flow and conceal its API invocation patterns. This allows the EDR killer to operate undetected in memory.

Once activated, the EDR killer loads two helper drivers:

  • rwdrv.sys: Provides access to the system's physical memory.
  • hlpdrv.sys: Terminates EDR processes.

Prior to loading these drivers, the EDR killer unregisters monitoring callbacks set by the EDR, ensuring that the termination process goes uninterrupted.

Who's Being Targeted

The Qilin ransomware targets organizations that rely on EDR systems for cybersecurity. As EDR tools become more common, attackers are increasingly focusing on disabling these defenses to gain a foothold in compromised systems.

Signs of Infection

Organizations should be vigilant for signs of infection, including:

  • Unexplained system slowdowns.
  • Unusual network activity or unexpected process terminations.
  • Alerts from EDR solutions that may indicate attempts to disable them.

Defensive Measures

To protect against this sophisticated malware, organizations should:

  • Regularly update and patch EDR solutions to defend against known vulnerabilities.
  • Implement multi-layered security strategies that include behavioral detection and incident response plans.
  • Monitor for unusual system behavior and conduct regular security audits.

Conclusion

The Qilin ransomware's use of msimg32.dll represents a significant evolution in malware tactics, targeting the very defenses meant to protect systems. Understanding how this infection chain operates is crucial for developing effective countermeasures against such sophisticated threats.

🔒 Pro insight: The Qilin ransomware's EDR bypass techniques may inspire future malware to adopt similar evasion strategies, highlighting the need for adaptive security measures.

Original article from

TACisco Talos Intelligence· Takahiro Takeda
Read Full Article

Related Pings

HIGHMalware & Ransomware

Ransomware Threats in Japan - Qilin's Rising Impact Explained

Japan saw a 17.5% rise in ransomware incidents in 2025, primarily from the Qilin group. This increase poses serious risks to businesses, especially small and medium enterprises. Organizations must enhance their defenses and detection strategies to combat this growing threat.

Cisco Talos Intelligence·
HIGHMalware & Ransomware

CrystalX RAT Emerges - A New Threat in Malware Landscape

A new malware named CrystalX RAT has emerged, capable of spying and stealing sensitive information. It primarily targets users in Russia but poses a global risk. Users should be vigilant and take protective measures against this sophisticated threat.

SecurityWeek·
HIGHMalware & Ransomware

WhatsApp Malware Campaign - New VBS Scripts Exploit Users

A new malware campaign is exploiting WhatsApp to deliver harmful VBS files to Windows users. This stealthy attack can compromise systems without alerting victims. Stay informed and learn how to protect yourself from these threats.

Cyber Security News·
HIGHMalware & Ransomware

Fake WhatsApp App - Italian Spyware Vendor Targets Users

WhatsApp has blocked a fake app created by Italian firm Asigint that targeted 200 users with spyware. This incident reveals serious security risks. Stay vigilant and only download official apps.

Security Affairs·
HIGHMalware & Ransomware

Remcos RAT - Multi-Stage Infection Chain Exposed

A new Remcos RAT campaign has been uncovered, using sophisticated techniques to hide malware. This multi-layered attack targets users through phishing emails, leading to serious data breaches. Understanding this threat is crucial for effective defense against such advanced cyber attacks.

Cyber Security News·
HIGHMalware & Ransomware

Linux Rootkit Detection - Importance of Behavioral Analysis

Rootkits in Linux systems are a growing threat, exposing the weaknesses of static detection methods. This article discusses how behavioral detection can enhance security. Discover techniques to better protect your systems against these stealthy attacks.

Elastic Security Labs·