Ransom:Win32/Qilin!MTB
Ransom:Win32/Qilin!MTB is a ransomware that encrypts files on infected devices and demands payment to unlock them. Developed in Go programming language, this ransomware is highly adaptable and customizable.
By using sophisticated encryption methods, it blocks users from accessing their data, which can lead to significant disruption.
Ransom:Win32/Qilinloader!rfn
Ransom:Win32/Qilinloader!rfn is a malicious loader used by the Qilin ransomware, a ransomware-as-a-service (RaaS) that was first documented in August 2022. Its payload is the main Qilin ransomware binary which is multi-platform, it targets Windows, Linux and VMware ESXi hosts that also includes embedded devices. Qilin is also associated with state-sponsored threat actors known as Moonstone Sleet that shared resources since February 2025.
The Qilinloader infects devices through phishing emails, trojanized apps, malicious npm packages, or fake software development tools. After deployment, it establishes data encryption and exfiltration as well extortion with ransom demands from small medium enterprises to large firms.
The !rfn suffix of Microsoft's naming scheme signifies heuristic detection of a Qilinloader variant, not through a full static signature. It is identified through behavior monitoring and not by any previously defined signatures, which points to its ever-evolving evasive mechanism.
Ransom:Win32/Qilinloader.AL!MTB
Ransom:Win32/Qilinloader.AL!MTB is a malicious loader that contains the functionality of Qilin ransomeware in itself, a ransomware-as-a-service (RaaS) that was first documented in August 2022. It distinguishes itself from Ransom:Win32/Qilinloader!rfn, as it is identified via signature-based detection as denoted by its !MTB designation. It is a self-contained ransomware with encryption logic, exclusion lists, and ransom note generation.
It targets Windows, Linux and VMware ESXi hosts that also include embedded devices. Qilin is also associated with state-sponsored threat actors known as Moonstone Sleet that shared resources since February 2025.
The Qilinloader infects devices through phishing emails, trojanized apps, malicious npm packages, or fake software development tools. After deployment, it establishes data encryption and exfiltration as well extortion with ransom demands from small medium enterprises to large firms.
Ransom:Win32/QilinLoader.MKV!MTB
Ransom:Win32/QilinLoader.MKV!MTB is a malicious loader that contains the functionality of Qilin ransomeware, a ransomware-as-a-service (RaaS) that was first documented in August 2022. It distinguishes itself from Ransom:Win32/Qilinloader!rfn, as it is identified via signature-based detection as denoted by its !MTB designation. It is a self-contained ransomware with encryption logic, exclusion lists, and ransom note generation.
It targets Windows, Linux and VMware ESXi hosts that also include embedded devices. Qilin is also associated with state-sponsored threat actors known as Moonstone Sleet that shared resources since February 2025.
The Qilinloader infects devices through phishing emails, trojanized apps, malicious npm packages, or fake software development tools. After deployment, it establishes data encryption and exfiltration as well extortion with ransom demands from small medium enterprises to large firms.