Advanced EDR Bypass Techniques Observed in Qilin Ransomware Campaign
TL;DR
Recent analysis by Cisco Talos reveals the use of a malicious dynamic-link library, “msimg32.dll,” in Qilin ransomware attacks, designed to disable over 300 different endpoint detection and response tools. The analysis details the complex multi-stage infection chain employed to evade detection and manipulate system processes.
Main Analysis
The focus of the analysis is the “msimg32.dll” dynamic-link library, indicating its critical role in the Qilin ransomware attacks. This DLL triggers a sophisticated multi-stage infection, beginning with a PE loader that prepares the execution environment for an EDR killer component. The loader utilizes multiple evasion techniques such as structured and vectored exception handling mechanisms to obscure its operations, ultimately allowing it to execute in memory without detection.
The initial phase of the malicious operation involves loading two drivers, “rwdrv.sys” and “hlpdrv.sys.” The first driver accesses the system’s physical memory, while the second is tasked with terminating existing EDR processes. Notably, the malware employs advanced obfuscation techniques that neutralize user-mode hooks and block event tracing, thereby limiting the visibility of EDR systems. The malware’s intricate control flow and payload execution techniques reflect a targeted effort to undermine standard detection mechanisms.
Figures in the article illustrate the execution flow of the infection chain, emphasizing the loader’s capabilities in modifying system memory to conceal its activities. Various stages reveal the detailed workings of the malware—decoding and executing a hidden payload designed to disable EDR tools, demonstrating how the EDR killer operates effectively across diverse security products.
Defensive Context
Organizations utilizing EDR solutions should be particularly vigilant, as this threat is specifically designed to disable such systems. Enterprises with critical endpoints tied to sensitive operations—especially those leveraging widely used EDR products—are at a heightened risk. Conversely, smaller organizations or those without substantial EDR practices may have a lower immediate exposure, primarily due to the technical complexity required for effective exploitation.
In the real world, the ability of “msimg32.dll” to disable EDR tools spans a broad spectrum of environments, making it critical for defenders to understand the intricacies of this attack method. The targeted nature of the malware demonstrates a shift in malicious tactics, where attackers now focus on compromising security layers instead of merely exploiting software vulnerabilities.
Why This Matters
The risks associated with this type of malware are significant for businesses heavily reliant on EDR for threat detection and response. Organizations with outdated or inadequate security measures are particularly vulnerable, leaving them open to the effective disabling of their protective measures.
Defender considerations involve thorough monitoring for signs of this malware’s activity, particularly in accounts with administrative privileges that could facilitate the installation of the malicious DLL and accompanying drivers. The specifics of the malware’s operation underscore the importance of a layered security strategy, beyond singular EDR solutions, to effectively combat these advanced threats.
Indicators of Compromise (IOCs)
The analysis provides multiple concrete IOCs for tracking and mitigating the threat, including:
- “msimg32.dll”
- MD5: 89ee7235906f7d12737679860264feaf
- SHA1: 01d00d3dd8bc8fd92dae9e04d0f076cb3158dc9c
- SHA256: 7787da25451f5538766240f4a8a2846d0a589c59391e15f188aa077e8b888497
- “rwdrv.sys”
- MD5: 6bc8e3505d9f51368ddf323acb6abc49
- SHA1: 82ed942a52cdcf120a8919730e00ba37619661a3
- SHA256: 16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0
- “hlpdrv.sys”
- Various hashes included in the original text.
The detailed analysis not only sheds light on the mechanics of the attack but also reinforces the ongoing need for vigilance and adaptive strategies in cybersecurity practices.



