118. YDArk: Another Tool in a Ransomware Affiliate's Arsenal

Hello everyone!

It's time to talk about defense evasion tools observed in ransomware attacks again! This time we'll look at Qilin's toolkit.


The tool we are going to look at is YDArk. It's a powerful kernel manipulation tool that appeared in the Chinese underground forums back in 2020. Of course, it's used by the adversary to kill AV/EDR related processes.

As always, we can the original file name for detection:

event_type: "processcreatewin"

AND

proc_file_originalfilename: "YDArk.exe"

Also, you can focus on the driver it uses:

event_type: "driverloadwin"

AND

file_name: "YDArkDrv.sys"

It also creates a service - you can also use it as a detection opportunity!

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge