Skip to main content
Skip to main content
9 entries found.
Updated on May 26, 2023

Ransom:Win32/Qilin!MTB is a ransomware that encrypts files on infected devices and demands payment to unlock them. Developed in Go programming language, this ransomware is highly adaptable and customizable. 

By using sophisticated encryption methods, it blocks users from accessing their data, which can lead to significant disruption.

Alert level: severe
Updated on Aug 27, 2025
Alert level: severe
Updated on Nov 12, 2023
Alert level: severe
Updated on May 20, 2025
Alert level: severe
Updated on May 20, 2025

Ransom:Win32/Qilinloader!rfn is a malicious loader used by the Qilin ransomware, a ransomware-as-a-service (RaaS) that was first documented in August 2022. Its payload is the main Qilin ransomware binary which is multi-platform, it targets Windows, Linux and VMware ESXi hosts that also includes embedded devices. Qilin is also associated with state-sponsored threat actors known as Moonstone Sleet that shared resources since February 2025. 

The Qilinloader infects devices through phishing emails, trojanized apps, malicious npm packages, or fake software development tools. After deployment, it establishes data encryption and exfiltration as well extortion with ransom demands from small medium enterprises to large firms. 

The !rfn suffix of Microsoft's naming scheme signifies heuristic detection of a Qilinloader variant, not through a full static signature. It is identified through behavior monitoring and not by any previously defined signatures, which points to its ever-evolving evasive mechanism. 

Alert level: severe
Updated on Sep 16, 2022
Alert level: severe
Updated on Mar 23, 2024

Ransom:Win32/Qilinloader.AL!MTB is a malicious loader that contains the functionality of Qilin ransomeware in itself, a ransomware-as-a-service (RaaS) that was first documented in August 2022. It distinguishes itself from Ransom:Win32/Qilinloader!rfn, as it is identified via signature-based detection as denoted by its !MTB designation. It is a self-contained ransomware with encryption logic, exclusion lists, and ransom note generation. 

It targets Windows, Linux and VMware ESXi hosts that also include embedded devices. Qilin is also associated with state-sponsored threat actors known as Moonstone Sleet that shared resources since February 2025. 

The Qilinloader infects devices through phishing emails, trojanized apps, malicious npm packages, or fake software development tools. After deployment, it establishes data encryption and exfiltration as well extortion with ransom demands from small medium enterprises to large firms. 

Alert level: severe
Updated on Jun 18, 2025
Alert level: severe
Updated on Mar 23, 2024

Ransom:Win32/QilinLoader.MKV!MTB is a malicious loader that contains the functionality of Qilin ransomeware, a ransomware-as-a-service (RaaS) that was first documented in August 2022. It distinguishes itself from Ransom:Win32/Qilinloader!rfn, as it is identified via signature-based detection as denoted by its !MTB designation. It is a self-contained ransomware with encryption logic, exclusion lists, and ransom note generation. 

It targets Windows, Linux and VMware ESXi hosts that also include embedded devices. Qilin is also associated with state-sponsored threat actors known as Moonstone Sleet that shared resources since February 2025. 

The Qilinloader infects devices through phishing emails, trojanized apps, malicious npm packages, or fake software development tools. After deployment, it establishes data encryption and exfiltration as well extortion with ransom demands from small medium enterprises to large firms. 

Alert level: severe