Qilin has emerged as one of the most advanced and structured ransomware-as-a-service (RaaS) operations currently active. The group provides affiliates with a sophisticated toolkit including cross-platform ransomware, an affiliate panel with granular control over payload configuration, and built-in features for safe-mode execution, shadow copy deletion, log cleaning, and automated negotiation. Beyond malware delivery, Qilin positions itself as a “full-service” operation, offering affiliates infrastructure, communications, and even legal/media support to sustain extortion pressure. Notably, its payloads are engineered with VMware awareness, enabling effective disruption of virtualized enterprise environments where many critical workloads reside. This combination of technical depth and organizational services makes Qilin a central player in the evolving ransomware ecosystem, particularly as rival groups fragment.
Qilin’s ransomware payloads are written in both Rust and C, allowing cross-platform support across Windows and Linux environments. The binaries include features such as service and process termination, volume shadow copy deletion, and reboot-to-safe-mode functionality to bypass endpoint defenses during encryption. The malware shows explicit handling of VMware processes, enabling it to cripple virtualized workloads before encrypting underlying data stores. Together, these capabilities show that Qilin is deliberately engineering its ransomware to maximize persistence, stealth, and operational control for affiliates.
IOCs (7)
Scan your environment for IOCs →IP ADDRESS 3
80.64.16.87185.196.10.19185.208.156.157SHA256 FILE HASH 4
31c3574456573c89d444478772597db40f075e25c67b8de39926d2faa63ca1d8C9707a3bc0f177e1d1a5587c61699975b1153406962d187c9a732f97d8f867c513cda19a9bf493f168d0eb6e8b2300828017b0ef437f75548a6c50bfb4a42a09a7f2a21c0cd5681eab30265432367cf4b649d2b340963a977e70a16738e955acDetections
Enable detections →- ESXi VM Force Kill Command Execution
- VMware Snapshot Removal Command Execution
- Detect deletion of volume shadow copies or disabling of backup services
- Monitor signed Windows binaries used to proxy execution of untrusted code (LOLBins)
- Monitor for services created or modified to execute payloads
- Alert on deletion of log files, scripts, or artifacts immediately after execution
- Detect clearing of Windows Event Logs or selective event deletion
- Detect enumeration of attached peripheral devices or removable media
- Alert on ESXi administrative commands executed outside of normal change windows
- Detect mass file encryption patterns — high-frequency file writes with entropy changes
- Flag enumeration of domain accounts, groups, or trust relationships