Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026

      Ashley St. Clair, the mother of one of Elon Musk’s children, sues xAI over Grok sexual images

      January 17, 2026

      Anthropic joins OpenAI’s push into health care with new Claude tools

      January 12, 2026
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      $200 Million Deployed: Why Binance’s Bitcoin Conversions Haven’t Moved the Market

      February 4, 2026

      One Bitcoin Chart Correctly Predicts the 5% Bounce — But 3 Metrics Now Question It

      February 4, 2026

      Tether’s $500 Billion Fundraising Retreat Stokes Speculation—Is an IPO Ever Coming?

      February 4, 2026

      BitMine Faces Over $6 Billion in Unrealized Losses, but Tom Lee Says It’s Part of the Plan

      February 4, 2026

      Why Bitcoin’s Defense of $76,000 Matters for MicroStrategy’s Q4 Earnings Narrative

      February 4, 2026
    • Technology

      9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

      February 4, 2026

      I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

      February 4, 2026

      Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

      February 4, 2026

      We Retested Every Meal Kit Service. This Underdog Is Our New Favorite in 2026

      February 4, 2026

      Today’s NYT Connections: Sports Edition Hints and Answers for Feb. 4, #499

      February 4, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Piecing Together the Puzzle: A Qilin Ransomware Investigation
    Technology

    Piecing Together the Puzzle: A Qilin Ransomware Investigation

    TechAiVerseBy TechAiVerseNovember 23, 2025No Comments8 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Piecing Together the Puzzle: A Qilin Ransomware Investigation
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Piecing Together the Puzzle: A Qilin Ransomware Investigation

    Written by Lindsey O’Donnell-Welch, Ben Folland, Harlan Carvey of Huntress Labs.

    A big part of a security analyst’s everyday role is figuring out what actually happened during an incident. We can do that by piecing together breadcrumbs–whether that’s through logs, antivirus detections, and other clues–that help us understand how the attacker achieved initial access and what they did after.

    However, it’s not always cut and dry: sometimes there are external factors that limit our visibility. The Huntress agent might not be deployed across all endpoints, for example, or the targeted organization might install the Huntress agent after a compromise has already occurred.

    In these cases, we need to get creative and look at multiple data sources in order to determine what actually happened.

    Recently, we analyzed an incident where both of the above factors were true: on October 11, an organization installed the Huntress agent post-incident, and initially on one endpoint.

    When it comes to visibility, this incident was less about looking through a keyhole, and more akin to looking through a pinhole. Even so, Huntress analysts were able to derive a great deal of information regarding the incident.

    The Qilin incident: What we started with

    The Huntress agent was installed on a single endpoint following a Qilin ransomware infection. What does that mean from the perspective of an analyst trying to figure out what happened?

    We had limited clues to start: there was no endpoint detection and response (EDR) or SIEM telemetry available, and Huntress-specific ransomware canaries weren’t tripped. Because we were also on one endpoint, our visibility was limited to the activity that had occurred on that specific endpoint within the broader environment’s infrastructure. 

    As a result, all Huntress analysts had to start with to unravel this incident was the managed antivirus (MAV) alerts. Once the Huntress agent was added to the endpoint, the SOC was alerted to existing MAV detections, some of which are illustrated in Figure 1.

    Figure 1: MAV alerts that tripped after the ransom note was dropped

    Simplify Your Path to CMMC Compliance

    Preparing for CMMC Level 2 certification doesn’t have to be overwhelming.

    Huntress provides the tools, documentation, and expert guidance you need to streamline your audit process and protect your contracts. Let us help you achieve compliance faster and more affordably.

    Learn More

    Analysts began tasking files from the endpoint, starting with a specific subset of the Windows Event Logs (WEL).

    From those logs, analysts could see that on 8 Oct 2025, the threat actor accessed the endpoint and installed the Total Software Deployment Service, as well as a rogue instance of the ScreenConnect RMM, one that pointed to IP address 94.156.232[.]40.

    Searching VirusTotal for the IP address provided the insight illustrated in Figure 2.

    Figure 2: VirusTotal response for the IP address 94.156.232[.]40

    An interesting aspect of the installation was that LogMeIn was apparently legitimately installed on the endpoint on 20 Aug 2025 from the file %user%DownloadsLogMeIn.msi.

    Then, on 8 Oct, the rogue ScreenConnect instance was installed from the file C:UsersadministratorAppDataRoamingInstallerLogmeinClient.msi.

    Further, the timeline indicates that on 2 Oct, the file %user%DownloadsLogMeIn Client.exe was submitted by Windows Defender for review, and no other action was taken after that event. 

    Pivoting from the ScreenConnect installation to ScreenConnect activity events within the timeline of activity, analysts saw that on 11 Oct, three files were transferred to the endpoint via the ScreenConnect instance; r.ps1, s.exe, and ss.exe.

    Digging in a bit deeper, only r.ps1 was still found on the endpoint (shown below).

    $RDPAuths = Get-WinEvent -LogName
    'Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational'
    -FilterXPath @'
    
    '@
    # Get specific properties from the event XML
    [xml[]]$xml=$RDPAuths|Foreach{$_.ToXml()}
    $EventData = Foreach ($event in $xml.Event) {
      # Create custom object for event data
      New-Object PSObject -Property @{
       TimeCreated = (Get-Date ($event.System.TimeCreated.SystemTime) -Format 'yyyy-MM-dd hh:mm:ss K')
       User = $event.UserData.EventXML.Param1
       Domain = $event.UserData.EventXML.Param2
       Client = $event.UserData.EventXML.Param3
      }
    }
    $EventData | FT

    Based on the contents of the script, it would appear that the threat actor was interested in determining IP addresses, domains, and usernames associated with RDP accesses to the endpoint. 

    However, the Windows Event Log contained a Microsoft-Windows-PowerShell/4100 message stating:

    Error Message = File C:WINDOWSsystemtempScreenConnect22.10.10924.8404Filesr.ps1 cannot be loaded because running scripts is disabled on this system.

    This message was logged within 20 seconds of the script being transferred to the endpoint, and the threat actor attempting to run it. 

    Parsing through PCA logs

    The other two files, s.exe and ss.exe, took a bit more work to unravel, because they were no longer found on the endpoint.

    However, Huntress analysts were able to take advantage of data sources on the Windows 11 endpoint, specifically the AmCache.hve file and the Program Compatibility Assistant (PCA) log files to obtain hashes for the files, and to see that while the threat actor had attempted to execute the files, both apparently failed. 

    The threat actor disabled Windows Defender, which were seen in Windows Defender event records, starting with event ID 5001, indicating that the Real-Time Protection feature was disabled. This was followed by several event ID 5007 records, indicating that features such as SpyNetReporting and SubmitSamplesConsent had been modified (in this case, disabled), as well as SecurityCenter messages indicating that Windows Defender had entered a SECURITY_PRODUCT_STATE_SNOOZED state.

    The threat actor then attempted to launch s.exe, which was almost immediately followed by the message “Installer failed” in the PCA logs. Based on the identified VirusTotal detections shown in Figure 3, and the behaviors identified by VirusTotal, this file appears to be an infostealer. 

    Figure 3: VirusTotal response for s.exe file

    The messages in the PCA logs provide indications that the file, identified as an installer, failed to execute.

    Seven seconds later, the threat actor attempted to run ss.exe, which was immediately followed by the legitimate Windows application, c:windowssyswow64werfault.exe, being launched. The PCA logs then contained three consecutive messages stating, “PCA resolve is called, resolver name: CrashOnLaunch, result: 0” with respect to ss.exe, all indicating that the application did not run. 

    Again, prior to attempting to run the above two files, the threat actor disabled Windows Defender at 2025-10-11 01:34:21 UTC, resulting in the Windows Defender status being reported as SECURITY_PRODUCT_STATE_SNOOZED. At 2025-10-11 03:34:56 UTC, the threat actor accessed the endpoint remotely, and then at 2025-10-11 03:35:13 UTC, there were multiple Windows Defender detections for attempts to create ransom notes (i.e., Behavior:Win32/GenRansomNote), as well as Windows Defender messages indicating that remediation attempts failed.

    At this point, the Windows Defender status was reported as SECURITY_PRODUCT_STATE_ON. The Windows Defender detection, coupled with the preceding remote login, appears to indicate that the ransomware executable was launched from another endpoint, against network shares.

    Figure 4 illustrates an excerpt of a Qilin ransom note found on the endpoint.

    Figure 4: Qilin ransom note excerpt

    Qilin ransomware is a “ransomware-as-a-service” (RaaS) variant, meaning that while the ransomware logistics is managed from a central location, each affiliate likely follows a different attack pattern, leaving behind different traces and artifacts.

    For example, a number of Qilin incidents observed by Huntress analysts have started with the threat actor logging in via the Remote Desktop Protocol (RDP), and all included similar ransom notes and encrypted file extensions.

    However, in only one incident did analysts observe the use of s5cmd for data exfiltration. 

    The value of multiple data sources in an investigation

    Throughout this investigation, Huntress analysts weren’t looking through a keyhole. Remember, the Huntress agent was installed post-incident, so there was no EDR telemetry, no SIEM data, and no ransomware canaries on which to build an understanding of the incident progression.

    In addition, at the time the MAV alerts were received in the Huntress portal, this was the only endpoint within the infrastructure with a Huntress agent installed. 

    Rather than looking through a keyhole, analysts were looking through a pinhole. Yet, relying on multiple data sources led not only to a deeper understanding of the threat actor’s attempted activities on the endpoint, but also served to validate findings and provide a clearer picture of what actually occurred.

    For example, understanding that the threat actor used a rogue ScreenConnect instance to attempt to deploy several malicious files–including one that appeared to be an infostealer–can help inform the victim company when they are trying to determine the scope of the incident and how to respond.

    During an investigation, particularly one that is time-sensitive or even just assumed to be, it’s easy to fall prey to finding an artifact and building a story around it without first verifying or validating it. It can be easy to think, “…this is anomalous to me…”, without really considering if it’s anomalous within the infrastructure itself, particularly if the investigation is being performed by looking through a pinhole.

    Validating activity across multiple data sources, and not jumping to the first indicator as the basis for malicious activity, provides a much more accurate picture of the threat actor’s activities, and provides a foundation for more accurate decisions and remediations.

    Meet Huntress: Demo & AMA

    Cyber threats don’t take breaks, and neither do we. At Huntress, we’re always innovating because the job never stops when it comes to leveling up security and protecting businesses like yours.

    Bring your toughest questions, real-world scenarios, and security headaches. Let’s tackle them together.

    Reserve for the webinar!
     

    IOCs

    Indicator

    Description

    63bbb3bfea4e2eea

    Rogue ScreenConnect instance ID

    af9925161d84ef49e8fbbb08c3d276b49d391fd997d272fe1bf81f8c0b200ba1

    s.exe  hash

    ba79cdbcbd832a0b1c16928c9e8211781bf536cc

    ss.exe hash

    README-RECOVER-.txt

    Ransom note

    Sponsored and written by Huntress Labs.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleFCC rolls back cybersecurity rules for telcos, despite state-hacking risks
    Next Article Cox Enterprises discloses Oracle E-Business Suite data breach
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    February 4, 2026

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    February 4, 2026

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    February 4, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025651 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025245 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025145 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 4, 2026

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling ProsIf you’re a Peloton…

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    We Retested Every Meal Kit Service. This Underdog Is Our New Favorite in 2026

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    February 4, 20262 Views

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    February 4, 20262 Views

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    February 4, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.