top of page
  • Writer's pictureSecneurX Threat Analysis

What is Qilin Ransomware ?


Secneurx Analysts found Qilin ransomware in the wild and analsyed the sample. Qilin ransomware encrypts files after executing with a password and all encrypted file appends its extension (".MmXReVIxLV") to filenames. Also, it drops the "README-RECOVER-MmXReVIxLV.txt" file that contains a ransom note. After executing the Qilin ransomware all files and folders got encrypted and appended their filenames with a ".MmXReVIxLV" extension.For Example a file titled as "Sep2019.docx" appeared as "Sep2019.docx.MmXReVIxLV", "Jan2020.docx" as "Jan2020.docx.MmXReVIxLV", and so on.


Screenshot of files encrypted by Qilin ransomware




Qilin Ransomware Overview

Qilin ransomware note inform victims that their files have been encrypted. It also mentioned that the threat actor have been downloaded a data (Employee details, Credentials etc) form infected system. If the victims refused to communicated with threat actor the data will be published in readme.txt.


How does ransomware infect my computer?


Malware (ransomware included) is spread using phishing and social engineering tactics. Malicious programs are typically presented as or bundled with ordinary content. Infectious files can be executables (.exe, .run, etc.), archives (ZIP, RAR, etc.), Microsoft Office and PDF documents, JavaScript, and so on. When a virulent file is executed, run, or otherwise opened - the infection process is jumpstarted.

Screenshot of Qilin Ransomware Text file (“README-RECOVER-MmXReVIxLV.txt”)

Translated _readme.txt


 

-- Qilin


Your network/system was encrypted.

Encrypted files have new extension.

-- Compromising and sensitive data

We have downloaded compromising and sensitive data from you system/network

If you refuse to communicate with us and we do not come to an agreement your data will be published.


Data includes:


- Employees personal dataCVsDLSSN.

- Complete network map including credentials for local and remote services.

- Financial information including clients databillsbudgetsannual reportsbank statements.

- Complete datagrams/schemas/drawings for manufacturing in solidworks format

- And more...


-- Warning


1) If you modify files - our decrypt software won't able to recover data

2) If you use third party software - you can damage/modify files (see item 1)

3) You need cipher key / our decrypt software to restore you files.

4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions.

-- Recovery


1) Download tor browser: https://www.torproject.org/download/

2) Go to domain

3) Enter credentials

 

IOC DETAILS

e90bdaaf5f9ca900133b699f18e4062562148169b29cb4eb37a0577388c22527



What can you do to avoid being a ransomware victim?


As dangerous as ransomware is, simply being aware and staying updated with the latest ransomware trends can go a long way in securing your data and systems. Here are helpful tips on how you can defend yourself from a likely attack.


Scrutinize emails & its attachments before opening them


Be wary of emails from unverified sources. You can check by communicating directly with the purported sender to confirm if they sent the messages. To check its validity, you can use SecneurX Sandbox to verify the sanity of the email


Avoid clicking embedded links found in unverified emails


Such social engineering tricks can lead to the download of ransomware. Additionally, be wary of sites that prompt you to enter a CAPTCHA code as this could be linked to a ransomware attack. To check its validity, you can use services like SecneurX Sandbox to verify the reputation of the site.


Back up your important files


While prevention is always better than the cure, having a backup of important files can at least lessen the potential damage done by a ransomware attack. While being locked out of your own system is always a bad thing, at least it's not a total disaster since you can always retrieve your important files. The 3-2-1 backup rule applies here—three backup copies of your data on two different media, and one of those copies in a separate location


Regularly update software, programs, applications


Updating them to the latest versions can provide an added layer of protection against online threats as some ransomware arrive via vulnerability exploits.


Use a layered protection suite


Doing so can detect threats before they enter your network. Security solutions like SecneurX ATP can block Infectious files (like executables (.exe, .run, etc.), archives (ZIP, RAR, etc.), Microsoft Office and PDF documents, JavaScript, and so on) by scanning them at the point of entry of the organizations (File uploads, USB file transfers etc)


927 views0 comments
bottom of page