Skip to content
.ca
7 mincritical

QEMU abused to evade detection and enable ransomware delivery

Threat actors are actively abusing the QEMU hardware emulator to create hidden virtual machines on compromised hosts, effectively shielding their attack toolkits from endpoint detection and response (EDR) solutions. Recent campaigns, including those linked to the PayoutsKing ransomware group, leverage this technique alongside vulnerability exploitation and legitimate remote access tools to establish persistence, harvest credentials, and exfiltrate data.

Sens:ImmediateConf:highAnalyzed:2026-04-16reports

Authors: Morgan Demboski

ActorsSTAC4713STAC3725PayoutsKingGOLD ENCOUNTER

Source:Sophos

IOCs · 4

Key Takeaways

  • Threat actors are increasingly abusing QEMU to run malicious tools within hidden VMs, effectively bypassing host-based endpoint security controls.
  • Campaign STAC4713 uses QEMU as a reverse SSH backdoor to deliver tools and harvest credentials, and is linked to PayoutsKing ransomware.
  • Campaign STAC3725 exploits CitrixBleed2 to deploy a malicious ScreenConnect client and a QEMU VM for extensive network enumeration and credential theft.
  • Attackers are disguising QEMU virtual disk images with uncommon extensions like .db, .dll, and .qcow2.
  • Vulnerable drivers (BYOVD) and native tools (vssuirun.exe, print) are being abused to disable defenses and dump Active Directory databases.

Affected Systems

  • Windows
  • Active Directory
  • SonicWall VPNs
  • SolarWinds Web Help Desk
  • Citrix NetScaler

Vulnerabilities (CVEs)

  • CVE-2025-26399
  • CVE-2025-7775

Attack Chain

Attackers gain initial access by exploiting edge device vulnerabilities (CVE-2025-26399, CVE-2025-7775) or exposed VPNs. They establish persistence using scheduled tasks or malicious ScreenConnect clients, subsequently deploying a QEMU virtual machine disguised as a database or DLL file. Inside this hidden VM, they run an Alpine Linux environment loaded with attack tools (AdaptixC2, Impacket, BloodHound) to perform network reconnaissance, dump credentials via VSS, and exfiltrate data. Finally, the access is either monetized directly via PayoutsKing ransomware deployment or sold to other threat actors.

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: Yes
  • Platforms: Sophos

Sophos provides proprietary detection names (e.g., win-eva-prc-susp-qemu-1, WIN-DET-CREDS-NTDS-DUMP-FILE-1[2]) for identifying QEMU usage, credential dumping, and AdaptixC2.

Detection Engineering Assessment

EDR Visibility: Low — Malicious activity occurs inside the QEMU virtual machine, which is opaque to host-based EDR agents. Visibility is limited to the initial launch of the VM and host-level file/network artifacts. Network Visibility: Medium — Network traffic originates from the host, allowing detection of reverse SSH tunnels on non-standard ports and connections to known C2 IPs, though the traffic itself is encrypted. Detection Difficulty: Hard — The use of legitimate hypervisors (QEMU) and remote access tools (ScreenConnect) blends in with administrative activity, and the core malicious behavior is hidden inside the VM.

Required Log Sources

  • Process Creation (Event ID 4688 / Sysmon 1)
  • Network Connections (Sysmon 3)
  • Scheduled Task Creation (Event ID 4698)

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Look for qemu-system-x86_64.exe executing with unusual command-line arguments pointing to non-standard disk image extensions (.db, .dll).Process CreationDefense EvasionLow
Identify scheduled tasks created with names like 'TPMProfiler' that execute binaries out of unusual directories.Scheduled Task CreationPersistenceLow
Monitor for the print command being used in conjunction with vssuirun.exe or targeting sensitive files like NTDS.dit, SAM, or SYSTEM hives.Process CreationCredential AccessLow
Detect outbound network connections over port 22 (SSH) originating from unexpected processes or non-standard local ports (e.g., 32567, 22022).Network ConnectionsCommand and ControlMedium
Look for ADNotificationManager.exe executing from non-standard directories, indicating potential DLL sideloading of vcruntime140_1.dll.Process CreationDefense EvasionLow

Control Gaps

  • Host-based EDR introspection into virtualized environments
  • MFA on legacy VPNs

Key Behavioral Indicators

  • qemu-system-x86_64.exe running under SYSTEM
  • vssuirun.exe execution followed by print command
  • ScreenConnect client creating .zip files in Documents folder

False Positive Assessment

  • Medium

Recommendations

Immediate Mitigation

  • Block known C2 IP addresses and domains at the perimeter.
  • Search for and isolate hosts running unauthorized instances of QEMU or ScreenConnect.
  • Review scheduled tasks for 'TPMProfiler' or tasks launching QEMU.

Infrastructure Hardening

  • Enforce MFA on all external-facing VPNs and remote access portals.
  • Patch edge devices against known vulnerabilities (CVE-2025-26399, CVE-2025-7775).
  • Restrict outbound SSH traffic to authorized jump hosts only.

User Protection

  • Implement application control to block unauthorized execution of hypervisors like QEMU.
  • Deploy EDR in block mode for known vulnerable drivers (BYOVD).

Security Awareness

  • Train IT staff to recognize social engineering attempts impersonating IT support via Microsoft Teams.
  • Educate users on the risks of downloading unsolicited remote assistance tools like QuickAssist.

MITRE ATT&CK Mapping

  • T1564.006 - Hide Artifacts: Run Virtual Instance
  • T1562.001 - Impair Defenses: Disable or Modify Tools
  • T1053.005 - Scheduled Task/Job: Scheduled Task
  • T1003.003 - OS Credential Dumping: NTDS
  • T1572 - Protocol Tunneling
  • T1190 - Exploit Public-Facing Application
  • T1574.002 - Hijack Execution Flow: DLL Side-Loading
  • T1068 - Exploitation for Privilege Escalation

Additional IOCs

  • Ips:
    • 194[.]110[.]172[.]152 - Suspected C2 server; destination of an SSH reverse tunnel associated with STAC4713
    • 98[.]81[.]138[.]214 - Suspected C2 server; destination of SSH reverse tunnel established by vault.db file associated with STAC4713
    • 158[.]158[.]0[.]165 - Suspected C2 server; destination of SSH reverse tunnel established by vault.db file associated with STAC4713
  • File Hashes:
    • 25e4d0eacff44f67a0a9d13970656cf76e5fd78c (SHA1) - AdaptixC2 agent associated with STAC4713
    • f7a11aeaa4f0c748961bbebb2f9e12b6 (MD5) - AdaptixC2 agent associated with STAC4713
    • f3194018d60645e43afabac33ceb4e852f95241b410cd726b1c40e3021589937 (SHA256) - AdaptixC2 agent associated with STAC4713
    • 6c09b0d102361888daa7fa4f191f603a19af47cb (SHA1) - AdaptixC2 agent associated with STAC4713
    • b752ebfc1004f2c717609145e28243f3 (MD5) - AdaptixC2 agent associated with STAC4713
    • 66dc383e9e0852523fe50def0851b9268865f779 (SHA1) - QEMU malicious disk image containing attacker tools (vault.db) associated with STAC4713
    • a65f0144101d93656c5f9ad445b3993336e1f295a838351aeca6332c0949b463 (SHA256) - Legitimate QEMU executable (qemu-system-x86_64.exe) associated with STAC4713 and STAC3725
    • 903edad58d54f056bd94c8165cc20e105b054fa8 (SHA1) - Legitimate QEMU executable (qemu-system-x86_64.exe) associated with STAC4713 and STAC3725
    • b186baf2653c6c874e7b946647b048cc (MD5) - Legitimate QEMU executable (qemu-system-x86_64.exe) associated with STAC4713 and STAC3725
    • 3a33b5bceb1eba4cc749534b03dd245f965d8f200aa02392baad78f5021a20ff (SHA256) - Custom WireGuard traffic proxy binary (wg-obfuscator) associated with STAC4713
    • 8c8e75dc4b4e1f201b56133a00fa9d1d711ccb50 (SHA1) - Custom WireGuard traffic proxy binary (wg-obfuscator) associated with STAC4713
    • 6f55743091410dad6cdb0b7e474f03e7 (MD5) - Custom WireGuard traffic proxy binary (wg-obfuscator) associated with STAC4713
  • Registry Keys:
    • WDigest - Registry key added by attackers to store credentials in plaintext
  • File Paths:
    • C:\Users\<username>\Documents\ScreenConnect\Files\qemu_custom.zip - ZIP archive containing QEMU executable and disk image
    • qemu-system-x86_64.exe - Legitimate QEMU executable abused to run hidden VMs
    • vault.db - Disguised QEMU virtual hard disk image
    • bisrv.dll - Disguised QEMU virtual hard disk image
    • custom.qcow2 - QEMU virtual disk image containing Alpine Linux
    • vcruntime140_1.dll - Havoc C2 payload sideloaded via ADNotificationManager.exe
    • K7RKScan_1516.sys - Vulnerable kernel driver installed by attackers
    • vssuirun.exe - Volume Shadow Copy Service UI abused to create snapshots
    • ADNotificationManager.exe - Legitimate binary abused for DLL sideloading
  • Command Lines:
    • Purpose: Launch QEMU VM via scheduled task | Tools: schtasks, qemu-system-x86_64.exe | Stage: Execution/Persistence | qemu-system-x86_64.exe
    • Purpose: Copy Active Directory database and registry hives from VSS snapshot | Tools: print, vssuirun.exe | Stage: Credential Access | print