Skip to content

usrtem/Malware-Classification-Qilin

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

5 Commits
Β 
Β 
Β 
Β 

Repository files navigation

🧬 Malware Classification & Qilin Ransomware Analysis

This project explores major malware categories and trends, including a detailed case study on Qilin ransomware, a Ransomware-as-a-Service (RaaS) operation observed in the wild. It presents classification examples, threat actor tactics, and real-world telemetry data.

πŸ“„ Contents

🦠 Malware Types Covered

The following categories are described and compared using behavior-based characteristics and operational roles:

  • Backdoors – Enable stealthy, persistent access for threat actors
  • Downloaders – Install secondary payloads post-infection; often used for persistence
  • Worms – Self-replicating malware that spreads laterally across networks
  • Command & Control (C2) – Facilitates attacker communication and remote management (botnets, proxies)
  • Spyware / Keyloggers – Used for surveillance, credential theft, and user tracking

Data from recent AV telemetry and malware trend reports is used to illustrate modern usage and prevalence.

πŸ” Qilin Ransomware Spotlight

Qilin, also known as Agenda, is a RaaS threat actor known for:

  • Double extortion tactics (data encryption + leak threats)
  • Use of PowerShell, credential dumping, and persistence scripts
  • Targeting both Windows and Linux platforms
  • Lateral movement via RDP and SSH
  • Disk wiping and system recovery disabling

Qilin leverages spear-phishing for initial access and deploys obfuscation strategies using junk code and encoded command payloads.

πŸ” Data Sources

  • AV-TEST global malware telemetry (Windows-focused)
  • OSINT reports from HC3 and industry research
  • Analysis of real-world ransomware campaigns and malware behaviors

πŸ‘€ Author

Michael Twining
Cybersecurity Researcher | Malware & Threat Intelligence | GitHub: @usrtem
πŸ“« Contact: michael.twining@outlook.com
🌐 Portfolio: LinkedIn | YouTube

πŸ” License

This project is licensed under the Creative Commons Attribution 4.0 International License.

About

Comparative overview of malware types with a case study on Qilin ransomware operations, tooling, and tactics. Includes behavioral analysis and threat trends.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors