118. YDArk: Another Tool in a Ransomware Affiliate's Arsenal
Hello everyone!
It's time to talk about defense evasion tools observed in ransomware attacks again! This time we'll look at Qilin's toolkit.
The tool we are going to look at is YDArk. It's a powerful kernel manipulation tool that appeared in the Chinese underground forums back in 2020. Of course, it's used by the adversary to kill AV/EDR related processes.
As always, we can the original file name for detection:
event_type: "processcreatewin"
AND
proc_file_originalfilename: "YDArk.exe"
Also, you can focus on the driver it uses:
event_type: "driverloadwin"
AND
file_name: "YDArkDrv.sys"
It also creates a service - you can also use it as a detection opportunity!
See you tomorrow!
Comments
Post a Comment