<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Qilin Ransomware — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/qilin-ransomware/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 10:00:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/qilin-ransomware/feed.xml" rel="self" type="application/rss+xml"/><item><title>Qilin Ransomware EDR Killer Infection Chain</title><link>https://feed.craftedsignal.io/briefs/2026-04-qilin-edr-killer/</link><pubDate>Thu, 02 Apr 2026 10:00:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-qilin-edr-killer/</guid><description>Qilin ransomware employs a malicious msimg32.dll in a multi-stage infection chain to disable endpoint detection and response (EDR) solutions by evading detection and terminating EDR processes.</description><content:encoded><![CDATA[<p>The Qilin ransomware group is actively deploying a sophisticated EDR killer as part of their attack chain. The initial stage involves a malicious &ldquo;msimg32.dll&rdquo; that is likely side-loaded by a legitimate application. This DLL version triggers its malicious logic from within its DllMain function, leading to immediate execution upon loading. The EDR killer employs advanced evasion techniques, including neutralizing user-mode hooks, suppressing Event Tracing for Windows (ETW) event generation, and utilizing structured exception handling (SEH) and vectored exception handling (VEH) to obfuscate control flow. Once active, the EDR killer component loads helper drivers to access physical memory and terminate EDR processes. This allows the malware to disable over 300 different EDR drivers across a wide range of vendors, hindering incident response and enabling further malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A legitimate application loads the malicious &ldquo;msimg32.dll&rdquo;, likely through DLL side-loading, triggering execution from within the DllMain function.</li>
<li>The DLL allocates a heap buffer in process memory acting as a slot-policy table based on ntdll.dll&rsquo;s OptionalHeader.SizeOfCode, dividing the code region into 16-byte slots.</li>
<li>The malware iterates over the export table of &ldquo;ntdll.dll&rdquo; to resolve virtual addresses of syscall stubs, specifically targeting those starting with &ldquo;Nt&rdquo;.</li>
<li>Based on resolved addresses, the malware marks corresponding entries in the slot-policy table with default or special policies, specifically targeting NtTraceEvent, NtTraceControl, and NtAlpcSendWaitReceivePort.</li>
<li>The malware dynamically resolves ntdll!LdrProtectMrdata and invokes it to change the protection of the .mrdata section to writable.</li>
<li>The loader overwrites the dispatcher slot within the .mrdata section with its own custom exception handler to intercept and modify exception handling.</li>
<li>The custom exception handler manages breakpoint exceptions (0xCC), potentially as an anti-emulation technique.</li>
<li>The EDR killer component loads helper drivers, &ldquo;rwdrv.sys&rdquo; for physical memory access and &ldquo;hlpdrv.sys&rdquo; to terminate EDR processes, after unregistering monitoring callbacks to prevent interference.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of the Qilin EDR killer can disable over 300 different EDR drivers, severely impairing the ability of security teams to detect and respond to threats. This can lead to increased dwell time for ransomware and other malicious activities, resulting in significant data breaches, financial losses, and reputational damage. With telemetry collection disabled, defenders lose visibility into process, memory, and network activity, making it difficult to investigate and contain the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for DLLs loaded from non-standard locations, specifically &ldquo;msimg32.dll,&rdquo; using process creation logs to detect potential DLL side-loading attempts (rules in this brief).</li>
<li>Implement the Sigma rules provided in this brief to detect the modification of exception handler dispatchers, which is a key component of the EDR killer&rsquo;s evasion techniques.</li>
<li>Monitor for the loading of unsigned or untrusted drivers like &ldquo;rwdrv.sys&rdquo; and &ldquo;hlpdrv.sys&rdquo; using driver load events, as these are used to gain system privileges and terminate EDR processes.</li>
<li>Enable Sysmon process creation logging to capture detailed information about process execution, including command-line arguments and parent processes, to aid in the detection of malicious DLL loading.</li>
<li>Analyze process memory for evidence of user-mode hooks being neutralized or ETW event generation being suppressed. This requires more advanced memory forensics capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>qilin</category><category>edr-killer</category><category>ransomware</category><category>defense-evasion</category><category>windows</category></item></channel></rss>