Qilin Ransomware
Threat Hunting Guide • 4-6 hours
#1 ransomware threat to US SLTT organizations in Q2 2025. Covers GPO-based Chrome credential harvesting, BYOVD EDR evasion with dark.sys, Veeam backup targeting, and detection rules for Splunk, KQL, and Sigma.
Download Full Hunting Guide
Complete guide with 10 hunt modules, step-by-step procedures, detection queries (Splunk, KQL, Sigma), and IOCs.
10 Hunt Modules
Detection Rules
Copy these queries to detect Qilin activity in your environment.
VPN Access from Multiple Countries
index=vpn_logs action=success
| iplocation src_ip
| stats dc(Country) as country_count, values(Country) as countries by user
| where country_count > 1
| sort -country_count
Veeam Backup Job Modification
index=veeam_logs (action="JobDeleted" OR action="JobDisabled" OR action="TapeDeleted")
| stats count by action, job_name, user
| sort -count
Shadow Copy Deletion
index=windows sourcetype=WinEventLog:Security
(CommandLine="*vssadmin*delete*" OR CommandLine="*wmic*shadowcopy*delete*")
| stats count by ComputerName, User, CommandLine
Need More Detection Rules?
The full guide includes 15+ additional detection signatures and YARA rules.
Disclaimer: These detection rules are provided for defensive security purposes. Always test rules in a non-production environment before deployment. Rules may require tuning for your specific environment. Sources: Cisco Talos, Sophos X-Ops.
Key Indicators
File Names
Registry Keys
Terminal Server\fDenyTSConnections=0
Lsa\DisableRestrictedAdmin=0
CVEs Exploited
CVE-2024-21762 (FortiOS)
CVE-2024-55591 (FortiOS)
Tools Used
Full IOC list with SHA256 hashes and IP addresses available in the PDF download.
Automate Qilin Detection
BRACE continuously monitors for Qilin indicators and 100+ other ransomware groups. Get automated detection rules deployed to your SIEM.