{"id":21822,"date":"2022-10-26T08:57:37","date_gmt":"2022-10-26T08:57:37","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=21822"},"modified":"2026-04-17T18:07:43","modified_gmt":"2026-04-17T18:07:43","slug":"stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/","title":{"rendered":"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\"><strong>Overview<\/strong><\/h2>\n\n\n\n<p>The Magniber is a notorious ransomware. Unlike the common ransomware families such as Hive and LockBit that target companies, it is primarily used to blackmail individuals with a relatively low ransom around USD 2,500. The Magniber ransomware can neither be transmitted automatically nor used to upload user files, but encrypt files only. Here listed some Magniber-related ransom activities in 2022:<\/p>\n\n\n\n<p>In January 2022, the Magnber ransomware was disguised as a signed APPX file to infect the users&acirc;&euro;&trade; hosts when the user updated their Chrome and Edge browsers.<\/p>\n\n\n\n<p>In April 2022, the Magniber ransomware was disguised as Windows 10 updates (.msi file) and was distributed through malicious websites to infect user hosts.<\/p>\n\n\n\n<p>In September 2022, the improved Magnber ransomware was disguised as a JavaScript (.js file) to infect the users&acirc;&euro;&trade; hosts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Attack Method<\/strong><\/h2>\n\n\n\n<p>The new variant of Magniber captured in September 2022 used an attack method similar to that in May this year &acirc;&euro;&ldquo; masquerading as a Windows update file to encrypt the users&acirc;&euro;&trade; host files for ransom.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/1-1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"852\" height=\"362\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/1-1.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21823\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/1-1.png 852w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/1-1-300x127.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/1-1-768x326.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/1-1-600x255.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/1-1-200x85.png 200w\" sizes=\"(max-width: 852px) 100vw, 852px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Magniber samples disguised as Windows update files(.msi file) in May 2022<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/2-1.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/2-1.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21825\" width=\"772\" height=\"372\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/2-1.png 972w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/2-1-300x145.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/2-1-768x371.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/2-1-600x290.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/2-1-200x97.png 200w\" sizes=\"(max-width: 772px) 100vw, 772px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Magniber samples disguised as Windows update file (.js file)in September 2022<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Reverse Analysis<\/strong> &Acirc;&nbsp;<\/h2>\n\n\n\n<p>Before we dive into the details, let&acirc;&euro;&trade;s see the implementation process first.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/3-1.png\"><img decoding=\"async\" width=\"1024\" height=\"569\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/3-1-1024x569.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21829\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/3-1-1024x569.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/3-1-300x167.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/3-1-768x427.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/3-1-600x333.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/3-1-200x111.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/3-1.png 1037w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Implementation process<\/p>\n\n\n\n<p><strong>1.  JavaScript file<\/strong><\/p>\n\n\n\n<p>This time the Magniber ransomware was written in JavaScript, and its code was obfuscated<a> <\/a>slightly.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/4-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/4-1-1024x369.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21831\" width=\"785\" height=\"282\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/4-1-1024x369.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/4-1-300x108.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/4-1-768x277.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/4-1-1536x553.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/4-1-600x216.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/4-1-200x72.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/4-1.png 1832w\" sizes=\"(max-width: 785px) 100vw, 785px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">JavaScript code used in Magniber ransomware<\/p>\n\n\n\n<p>When we examined the code, we found that the JavaScript code in the Magniber ransomware was similar to the code generated by an open-source tool GadgetToJScript.<\/p>\n\n\n\n<p>With this tool, .NET programs can be encapsulated in JS, VBS, VBA or HTA scripts. Although the sample captured this time is a JavaScript file, it does not rule out the possibility that ransomware will be converted into VBS, VBA or HTA scripts in subsequent attacks.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1442\" height=\"514\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/5-1024x365.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21833\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/5-1024x365.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/5-300x107.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/5-768x274.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/5-600x214.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/5-200x71.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/5.png 1442w\" sizes=\"(max-width: 1442px) 100vw, 1442px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>When the BinaryFormatter in the JS\/VBS\/VBA script is used for deserialization, .NET assembly loading\/execution can be triggered. Taking this advantage, attackers can execute its built-in. NET code in the above JavaScript code.<\/p>\n\n\n\n<p>The .NET program contains little code. Its primary function is to decrypt the shellcode and set the callback function address of EnumUILanguages as the shellcode entry, then call the EnumUILanguages function to execute the shell code.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/6-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"351\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/6-1-1024x351.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21837\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/6-1-1024x351.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/6-1-300x103.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/6-1-768x263.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/6-1-1536x526.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/6-1-600x206.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/6-1-200x69.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/6-1.png 1713w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><strong>2.  Shellcode<\/strong><\/p>\n\n\n\n<p>When Shellcode was executed, it called NtQuerySystemInformation first to obtain all processes running on the current system, used the NtOpenProcess function to obtain handles of the injection process, and then used the NtQueryInformationProcess function to identify whether the current process is 64-bit. If true, it called functions such as NtWriteVirtualMemory, NtProtectVirtualMemory, NtCreateThreadEx, and NtResumeThread for thread injection.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/7.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/7-1024x631.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21839\" width=\"666\" height=\"410\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/7-1024x631.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/7-300x185.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/7-768x473.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/7-600x370.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/7-200x123.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/7.png 1071w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\"> Process of injection function judgment<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/8.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/8.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21841\" width=\"574\" height=\"452\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/8.png 761w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/8-300x236.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/8-570x450.png 570w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/8-600x472.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/8-200x157.png 200w\" sizes=\"(max-width: 574px) 100vw, 574px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Process of execution injection<\/p>\n\n\n\n<p>It is worth mentioning that Magniber selected uploading the call number and used Syscall to call the kernel function directly to bypass the anti-virus software&#8217;s monitoring of Windows APIs. However, the call number required to call the same function in different Windows kernel versions is not necessarily the same. To support Windows hosts with different kernel versions, Magniber needs to judge the call number. By reverse analysis of Magniber calling the NtCreateThreadEx function, the currently supported Windows versions are found as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/13.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/13.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21843\" width=\"674\" height=\"509\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/13.png 814w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/13-300x227.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/13-768x580.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/13-600x453.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/13-200x151.png 200w\" sizes=\"(max-width: 674px) 100vw, 674px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><strong>3.  Injection Code<\/strong><\/p>\n\n\n\n<p>When executing the thread, the injected code is the ransomware virus itself actually. The samples captured this time are entirely consistent with the core functions captured earlier. The encryption process is as follows:<\/p>\n\n\n\n<p>(1) Obtain the list of folders and files on the current host;<\/p>\n\n\n\n<p>(2) Check the folder to be encrypted. If it is in the white list, do not encrypt it;<\/p>\n\n\n\n<p>(3) Judge whether the file extension of the current file is the extension of the file to be encrypted, and if it is, encrypt it;<\/p>\n\n\n\n<p>(4) Randomly generate the Key and IV required for AES encryption;<\/p>\n\n\n\n<p>(5) Use AES CBC mode to encrypt the current file;<\/p>\n\n\n\n<p>(6) Use the built-in RSA public key to encrypt the AES Key and IV and append the encryption result to the end of the file;<\/p>\n\n\n\n<p>(7) Add the extension. rfguxgmap to the encrypted file;<\/p>\n\n\n\n<p>(8) Create a README.html blackmail message in the folder of the encrypted file;<\/p>\n\n\n\n<p>(9) Use the Edge browser to open the blackmail page to remind users that their files have been encrypted.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/9.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/9-1024x193.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21845\" width=\"665\" height=\"125\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/9-1024x193.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/9-300x57.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/9-768x145.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/9-600x113.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/9-1280x242.png 1280w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/9-200x38.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/9.png 1282w\" sizes=\"(max-width: 665px) 100vw, 665px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Extension of the encrypted file<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/10.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/10-1024x594.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21847\" width=\"797\" height=\"462\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/10-1024x594.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/10-300x174.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/10-768x446.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/10-600x348.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/10-200x116.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/10.png 1242w\" sizes=\"(max-width: 797px) 100vw, 797px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Blackmail massage<\/p>\n\n\n\n<p>In the samples captured in May, the Magniber ransomware can delete the shadow copy and disable the Windows recovery function by thread injection. The new variant cut the thread injection process but deleted the shadow copy and disabled the Windows recovery function directly after the blackmail execution was completed.<\/p>\n\n\n\n<p>Similar to the sample captured in May, The Magniber ransomware chose to use UAC Bypass to trigger the operation of cleaning up Windows backups. The specific steps of UAC Bypass used in the sample are as follows:<\/p>\n\n\n\n<p>1. Locate Registry Key<\/p>\n\n\n\n<p>&acirc;&euro;&oelig;HKCU\\SOFTWARE\\Classes\\AppX04g0mbrz4mkc6e879rpf6qk6te730jfv\\Shell\\open\\command&acirc;&euro;<\/p>\n\n\n\n<p>2. Set the default Key value to:<\/p>\n\n\n\n<p>&acirc;&euro;&oelig;wscript.exe \/B \/E:VBScript.Encode ..\/..\/Users\/Public\/chvzelmd.rdb&acirc;&euro;<\/p>\n\n\n\n<p>3. Write encoded VBScript code that includes deleting shadow copies and system backups and disabling Windows recovery to the Public directory<\/p>\n\n\n\n<p>4. Create fodhelper.exe processes to trigger the UAC Bypass operation and execute the commands written in the registry<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/11.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"301\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/11-1024x301.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21849\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/11-1024x301.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/11-300x88.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/11-768x226.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/11-1536x452.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/11-600x176.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/11-200x59.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/11.png 1581w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Steps of UAC Bypass<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/12.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"408\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/12-1024x408.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21851\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/12-1024x408.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/12-300x119.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/12-768x306.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/12-600x239.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/12-200x80.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/12.png 1475w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Decrypted VBScript<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Protection Recommentations<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Do not download or run any patch files from unofficial websites;<\/li><li>Install anti-virus software with self-protection to prevent attackers from exiting or ending the process, and update the virus database on time;<\/li><li>In addition to the Magniber ransomware with the extensions of .exe, .msi and .js, stay alert of its variants with the extensions of .vbs and .hta;<\/li><li>Strengthen the security awareness of employees, and do not open any strange emails and suspicious links;<\/li><li>Modify the default user name of the system administrator and do not use user names such as admin, administrator, and test that attackers easily crack.<\/li><li>Strengthen host account and password management and level up the complexity and modification frequency;<\/li><li>Configure account locking policy through Windows group policy to lock accounts that fail to log in after several continuous attempts during a short time;<\/li><li>Enable the Windows system firewall, and strengthen RDP and SMB service access through ACL and other methods;<\/li><li>Timely update the security patches for critical vulnerabilities of the operating system and other commonly used software;<\/li><li>Back up critical business data regularly to prevent data damage or loss.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Appendix<\/h2>\n\n\n\n<p><strong>1. Encryption-related information<\/strong><\/p>\n\n\n\n<p>White list:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>&#8220;documents and settings&#8221;<\/p>\n\n\n\n<p>&#8220;appdata&#8221;<\/p>\n\n\n\n<p>&#8220;local settings&#8221;<\/p>\n\n\n\n<p>&#8220;sample music&#8221;<\/p>\n\n\n\n<p>&#8220;sample pictures&#8221;<\/p>\n\n\n\n<p>&#8220;sample videos&#8221;<\/p>\n\n\n\n<p>&#8220;tor browser&#8221;<\/p>\n\n\n\n<p>&#8220;recycle&#8221;<\/p>\n\n\n\n<p>&#8220;windows&#8221;<\/p>\n\n\n\n<p>&#8220;boot&#8221;<\/p>\n\n\n\n<p>&#8220;intel&#8221;<\/p>\n\n\n\n<p>&#8220;msocache&#8221;<\/p>\n\n\n\n<p>&#8220;perflogs&#8221;<\/p>\n\n\n\n<p>&#8220;program files&#8221;<\/p>\n\n\n\n<p>&#8220;programdata&#8221;<\/p>\n\n\n\n<p>&#8220;recovery&#8221; &#8220;system volume information&#8221;<\/p>\n<\/div><\/div>\n\n\n\n<p>Extensions of encrypted files:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>1-bit extensions for small-size files&iuml;&frac14;&scaron;&Acirc;&nbsp;[&#8216;c&#8217;,&Acirc;&nbsp;&#8216;h&#8217;,&Acirc;&nbsp;&#8216;j&#8217;,&Acirc;&nbsp;&#8216;p&#8217;,&Acirc;&nbsp;&#8216;x&#8217;]<\/p>\n\n\n\n<p>2-bit extensions for samll-size files: [&#8216;ai&#8217;, &#8216;ca&#8217;, &#8216;cd&#8217;, &#8216;cf&#8217;, &#8216;cs&#8217;, &#8216;ct&#8217;, &#8216;db&#8217;, &#8216;dd&#8217;, &#8216;dt&#8217;, &#8216;dv&#8217;, &#8216;dx&#8217;, &#8216;em&#8217;, &#8216;ep&#8217;, &#8216;eq&#8217;, &#8216;fa&#8217;, &#8216;fb&#8217;, &#8216;fi&#8217;, &#8216;fo&#8217;, &#8216;gv&#8217;, &#8216;hp&#8217;, &#8216;hs&#8217;, &#8216;hz&#8217;, &#8216;ib&#8217;, &#8216;ii&#8217;, &#8216;js&#8217;, &#8216;jw&#8217;, &#8216;ma&#8217;, &#8216;mb&#8217;, &#8216;me&#8217;, &#8216;mm&#8217;, &#8216;mx&#8217;, &#8216;my&#8217;, &#8216;of&#8217;, &#8216;pa&#8217;, &#8216;pm&#8217;, &#8216;pu&#8217;, &#8216;px&#8217;, &#8216;qd&#8217;, &#8216;rb&#8217;, &#8216;rd&#8217;, &#8216;rs&#8217;, &#8216;rt&#8217;, &#8216;rw&#8217;, &#8216;sh&#8217;, &#8216;sq&#8217;, &#8216;st&#8217;, &#8216;te&#8217;, &#8216;tm&#8217;, &#8216;vb&#8217;, &#8216;vm&#8217;, &#8216;vw&#8217;, &#8216;wn&#8217;, &#8216;wp&#8217;, &#8216;xd&#8217;, &#8216;ya&#8217;, &#8216;ym&#8217;, &#8216;zw&#8217;]<br>2-bit extension for large-size files&iuml;&frac14;&scaron; [&#8216;gz&#8217;]<br>3-bit extensions for small-size files&iuml;&frac14;&scaron;[&#8216;abm&#8217;, &#8216;abs&#8217;, &#8216;abw&#8217;, &#8216;act&#8217;, &#8216;adn&#8217;, &#8216;adp&#8217;, &#8216;aes&#8217;, &#8216;aft&#8217;, &#8216;afx&#8217;, &#8216;agp&#8217;, &#8216;ahd&#8217;, &#8216;aic&#8217;, &#8216;aim&#8217;, &#8216;alf&#8217;, &#8216;ans&#8217;, &#8216;apd&#8217;, &#8216;apm&#8217;, &#8216;aps&#8217;, &#8216;apt&#8217;, &#8216;apx&#8217;, &#8216;art&#8217;, &#8216;arw&#8217;, &#8216;asc&#8217;, &#8216;ase&#8217;, &#8216;ask&#8217;, &#8216;asm&#8217;, &#8216;asp&#8217;, &#8216;asw&#8217;, &#8216;asy&#8217;, &#8216;aty&#8217;, &#8216;awp&#8217;, &#8216;awt&#8217;, &#8216;aww&#8217;, &#8216;azz&#8217;, &#8216;bad&#8217;, &#8216;bay&#8217;, &#8216;bbs&#8217;, &#8216;bdb&#8217;, &#8216;bdp&#8217;, &#8216;bdr&#8217;, &#8216;bib&#8217;, &#8216;bmx&#8217;, &#8216;bna&#8217;, &#8216;bnd&#8217;, &#8216;boc&#8217;, &#8216;bok&#8217;, &#8216;brd&#8217;, &#8216;brk&#8217;, &#8216;brn&#8217;, &#8216;brt&#8217;, &#8216;bss&#8217;, &#8216;btd&#8217;, &#8216;bti&#8217;, &#8216;btr&#8217;, &#8216;can&#8217;, &#8216;cdb&#8217;, &#8216;cdc&#8217;, &#8216;cdg&#8217;, &#8216;cdr&#8217;, &#8216;cdt&#8217;, &#8216;cfu&#8217;, &#8216;cgm&#8217;, &#8216;cin&#8217;, &#8216;cit&#8217;, &#8216;ckp&#8217;, &#8216;cma&#8217;, &#8216;cmx&#8217;, &#8216;cnm&#8217;, &#8216;cnv&#8217;, &#8216;cpc&#8217;, &#8216;cpd&#8217;, &#8216;cpg&#8217;, &#8216;cpp&#8217;, &#8216;cps&#8217;, &#8216;cpx&#8217;, &#8216;crd&#8217;, &#8216;crt&#8217;, &#8216;crw&#8217;, &#8216;csr&#8217;, &#8216;csv&#8217;, &#8216;csy&#8217;, &#8216;cvg&#8217;, &#8216;cvi&#8217;, &#8216;cvs&#8217;, &#8216;cvx&#8217;, &#8216;cwt&#8217;, &#8216;cxf&#8217;, &#8216;cyi&#8217;, &#8216;dad&#8217;, &#8216;daf&#8217;, &#8216;dbc&#8217;, &#8216;dbf&#8217;, &#8216;dbk&#8217;, &#8216;dbs&#8217;, &#8216;dbt&#8217;, &#8216;dbv&#8217;, &#8216;dbx&#8217;, &#8216;dca&#8217;, &#8216;dcb&#8217;, &#8216;dch&#8217;, &#8216;dcr&#8217;, &#8216;dcs&#8217;, &#8216;dct&#8217;, &#8216;dcx&#8217;, &#8216;dds&#8217;, &#8216;ded&#8217;, &#8216;der&#8217;, &#8216;dgn&#8217;, &#8216;dgs&#8217;, &#8216;dgt&#8217;, &#8216;dhs&#8217;, &#8216;dib&#8217;, &#8216;dif&#8217;, &#8216;dip&#8217;, &#8216;diz&#8217;, &#8216;djv&#8217;, &#8216;dmi&#8217;, &#8216;dmo&#8217;, &#8216;dnc&#8217;, &#8216;dne&#8217;, &#8216;doc&#8217;, &#8216;dot&#8217;, &#8216;dpp&#8217;, &#8216;dpx&#8217;, &#8216;dqy&#8217;, &#8216;drw&#8217;, &#8216;drz&#8217;, &#8216;dsk&#8217;, &#8216;dsn&#8217;, &#8216;dsv&#8217;, &#8216;dta&#8217;, &#8216;dtw&#8217;, &#8216;dvi&#8217;, &#8216;dwg&#8217;, &#8216;dxb&#8217;, &#8216;dxf&#8217;, &#8216;eco&#8217;, &#8216;ecw&#8217;, &#8216;ecx&#8217;, &#8216;edb&#8217;, &#8216;efd&#8217;, &#8216;egc&#8217;, &#8216;eio&#8217;, &#8216;eip&#8217;, &#8216;eit&#8217;, &#8216;emd&#8217;, &#8216;emf&#8217;, &#8216;epf&#8217;, &#8216;epp&#8217;, &#8216;eps&#8217;, &#8216;erf&#8217;, &#8216;err&#8217;, &#8216;etf&#8217;, &#8216;etx&#8217;, &#8216;euc&#8217;, &#8216;exr&#8217;, &#8216;faq&#8217;, &#8216;fax&#8217;, &#8216;fbx&#8217;, &#8216;fcd&#8217;, &#8216;fcf&#8217;, &#8216;fdf&#8217;, &#8216;fdr&#8217;, &#8216;fds&#8217;, &#8216;fdt&#8217;, &#8216;fdx&#8217;, &#8216;fes&#8217;, &#8216;fft&#8217;, &#8216;fic&#8217;, &#8216;fid&#8217;, &#8216;fif&#8217;, &#8216;fig&#8217;, &#8216;flr&#8217;, &#8216;fmv&#8217;, &#8216;fpt&#8217;, &#8216;fpx&#8217;, &#8216;frm&#8217;, &#8216;frt&#8217;, &#8216;frx&#8217;, &#8216;ftn&#8217;, &#8216;fxc&#8217;, &#8216;fxg&#8217;, &#8216;fzb&#8217;, &#8216;fzv&#8217;, &#8216;gdb&#8217;, &#8216;gem&#8217;, &#8216;geo&#8217;, &#8216;gfb&#8217;, &#8216;ggr&#8217;, &#8216;gih&#8217;, &#8216;gim&#8217;, &#8216;gio&#8217;, &#8216;gpd&#8217;, &#8216;gpg&#8217;, &#8216;gpn&#8217;, &#8216;gro&#8217;, &#8216;grs&#8217;, &#8216;gsd&#8217;, &#8216;gtp&#8217;, &#8216;gwi&#8217;, &#8216;hbk&#8217;, &#8216;hdb&#8217;, &#8216;hdp&#8217;, &#8216;hdr&#8217;, &#8216;hht&#8217;, &#8216;his&#8217;, &#8216;hpg&#8217;, &#8216;hpi&#8217;, &#8216;htc&#8217;, &#8216;hwp&#8217;, &#8216;ibd&#8217;, &#8216;imd&#8217;, &#8216;ink&#8217;, &#8216;ipf&#8217;, &#8216;ipx&#8217;, &#8216;itw&#8217;, &#8216;iwi&#8217;, &#8216;jar&#8217;, &#8216;jas&#8217;, &#8216;jbr&#8217;, &#8216;jia&#8217;, &#8216;jis&#8217;, &#8216;jng&#8217;, &#8216;joe&#8217;, &#8216;jpe&#8217;, &#8216;jps&#8217;, &#8216;jpx&#8217;, &#8216;jsp&#8217;, &#8216;jtf&#8217;, &#8216;jtx&#8217;, &#8216;jxr&#8217;, &#8216;kdb&#8217;, &#8216;kdc&#8217;, &#8216;kdi&#8217;, &#8216;kdk&#8217;, &#8216;kes&#8217;, &#8216;key&#8217;, &#8216;kic&#8217;, &#8216;klg&#8217;, &#8216;knt&#8217;, &#8216;kon&#8217;, &#8216;kpg&#8217;, &#8216;kwd&#8217;, &#8216;lay&#8217;, &#8216;lbm&#8217;, &#8216;lbt&#8217;, &#8216;ldf&#8217;, &#8216;lgc&#8217;, &#8216;lis&#8217;, &#8216;lit&#8217;, &#8216;ljp&#8217;, &#8216;lmk&#8217;, &#8216;lnt&#8217;, &#8216;lrc&#8217;, &#8216;lst&#8217;, &#8216;ltr&#8217;, &#8216;ltx&#8217;, &#8216;lue&#8217;, &#8216;luf&#8217;, &#8216;lwo&#8217;, &#8216;lwp&#8217;, &#8216;lws&#8217;, &#8216;lyt&#8217;, &#8216;lyx&#8217;, &#8216;mac&#8217;, &#8216;man&#8217;, &#8216;map&#8217;, &#8216;maq&#8217;, &#8216;mat&#8217;, &#8216;max&#8217;, &#8216;mbm&#8217;, &#8216;mdb&#8217;, &#8216;mdf&#8217;, &#8216;mdn&#8217;, &#8216;mdt&#8217;, &#8216;mef&#8217;, &#8216;mel&#8217;, &#8216;mft&#8217;, &#8216;min&#8217;, &#8216;mnr&#8217;, &#8216;mnt&#8217;, &#8216;mos&#8217;, &#8216;mpf&#8217;, &#8216;mpo&#8217;, &#8216;mrg&#8217;, &#8216;msg&#8217;, &#8216;mud&#8217;, &#8216;mwb&#8217;, &#8216;mwp&#8217;, &#8216;myd&#8217;, &#8216;myi&#8217;, &#8216;ncr&#8217;, &#8216;nct&#8217;, &#8216;ndf&#8217;, &#8216;nef&#8217;, &#8216;nfo&#8217;, &#8216;njx&#8217;, &#8216;nlm&#8217;, &#8216;now&#8217;, &#8216;nrw&#8217;, &#8216;nsf&#8217;, &#8216;nyf&#8217;, &#8216;nzb&#8217;, &#8216;obj&#8217;, &#8216;oce&#8217;, &#8216;oci&#8217;, &#8216;odb&#8217;, &#8216;odg&#8217;, &#8216;odm&#8217;, &#8216;odo&#8217;, &#8216;odp&#8217;, &#8216;ods&#8217;, &#8216;odt&#8217;, &#8216;oft&#8217;, &#8216;omf&#8217;, &#8216;oqy&#8217;, &#8216;ora&#8217;, &#8216;orf&#8217;, &#8216;ort&#8217;, &#8216;orx&#8217;, &#8216;ost&#8217;, &#8216;ota&#8217;, &#8216;otg&#8217;, &#8216;oti&#8217;, &#8216;otp&#8217;, &#8216;ots&#8217;, &#8216;ott&#8217;, &#8216;ovp&#8217;, &#8216;ovr&#8217;, &#8216;owc&#8217;, &#8216;owg&#8217;, &#8216;oyx&#8217;, &#8216;ozb&#8217;, &#8216;ozj&#8217;, &#8216;ozt&#8217;, &#8216;pan&#8217;, &#8216;pap&#8217;, &#8216;pas&#8217;, &#8216;pbm&#8217;, &#8216;pcd&#8217;, &#8216;pcs&#8217;, &#8216;pdb&#8217;, &#8216;pdd&#8217;, &#8216;pdf&#8217;, &#8216;pdm&#8217;, &#8216;pds&#8217;, &#8216;pdt&#8217;, &#8216;pef&#8217;, &#8216;pem&#8217;, &#8216;pff&#8217;, &#8216;pfi&#8217;, &#8216;pfs&#8217;, &#8216;pfv&#8217;, &#8216;pfx&#8217;, &#8216;pgf&#8217;, &#8216;pgm&#8217;, &#8216;phm&#8217;, &#8216;php&#8217;, &#8216;pic&#8217;, &#8216;pix&#8217;, &#8216;pjt&#8217;, &#8216;plt&#8217;, &#8216;pmg&#8217;, &#8216;pni&#8217;, &#8216;pnm&#8217;, &#8216;pnz&#8217;, &#8216;pop&#8217;, &#8216;pot&#8217;, &#8216;ppm&#8217;, &#8216;pps&#8217;, &#8216;ppt&#8217;, &#8216;prt&#8217;, &#8216;prw&#8217;, &#8216;psd&#8217;, &#8216;pse&#8217;, &#8216;psp&#8217;, &#8216;pst&#8217;, &#8216;psw&#8217;, &#8216;ptg&#8217;, &#8216;pth&#8217;, &#8216;ptx&#8217;, &#8216;pvj&#8217;, &#8216;pvm&#8217;, &#8216;pvr&#8217;, &#8216;pwa&#8217;, &#8216;pwi&#8217;, &#8216;pwr&#8217;, &#8216;pxr&#8217;, &#8216;pza&#8217;, &#8216;pzp&#8217;, &#8216;pzs&#8217;, &#8216;qmg&#8217;, &#8216;qpx&#8217;, &#8216;qry&#8217;, &#8216;qvd&#8217;, &#8216;rad&#8217;, &#8216;ras&#8217;, &#8216;raw&#8217;, &#8216;rcu&#8217;, &#8216;rdb&#8217;, &#8216;rft&#8217;, &#8216;rgb&#8217;, &#8216;rgf&#8217;, &#8216;rib&#8217;, &#8216;ric&#8217;, &#8216;ris&#8217;, &#8216;rix&#8217;, &#8216;rle&#8217;, &#8216;rli&#8217;, &#8216;rng&#8217;, &#8216;rpd&#8217;, &#8216;rpf&#8217;, &#8216;rpt&#8217;, &#8216;rri&#8217;, &#8216;rsb&#8217;, &#8216;rsd&#8217;, &#8216;rsr&#8217;, &#8216;rst&#8217;, &#8216;rtd&#8217;, &#8216;rtf&#8217;, &#8216;rtx&#8217;, &#8216;run&#8217;, &#8216;rzk&#8217;, &#8216;rzn&#8217;, &#8216;saf&#8217;, &#8216;sam&#8217;, &#8216;sbf&#8217;, &#8216;scc&#8217;, &#8216;sch&#8217;, &#8216;sci&#8217;, &#8216;scm&#8217;, &#8216;sct&#8217;, &#8216;scv&#8217;, &#8216;scw&#8217;, &#8216;sdb&#8217;, &#8216;sdf&#8217;, &#8216;sdm&#8217;, &#8216;sdw&#8217;, &#8216;sep&#8217;, &#8216;sfc&#8217;, &#8216;sfw&#8217;, &#8216;sgm&#8217;, &#8216;sig&#8217;, &#8216;skm&#8217;, &#8216;sla&#8217;, &#8216;sld&#8217;, &#8216;slk&#8217;, &#8216;sln&#8217;, &#8216;sls&#8217;, &#8216;smf&#8217;, &#8216;sms&#8217;, &#8216;snt&#8217;, &#8216;sob&#8217;, &#8216;spa&#8217;, &#8216;spe&#8217;, &#8216;sph&#8217;, &#8216;spj&#8217;, &#8216;spp&#8217;, &#8216;spq&#8217;, &#8216;spr&#8217;, &#8216;sqb&#8217;, &#8216;srw&#8217;, &#8216;ssa&#8217;, &#8216;ssk&#8217;, &#8216;stc&#8217;, &#8216;std&#8217;, &#8216;sti&#8217;, &#8216;stm&#8217;, &#8216;stn&#8217;, &#8216;stp&#8217;, &#8216;str&#8217;, &#8216;stw&#8217;, &#8216;sty&#8217;, &#8216;sub&#8217;, &#8216;suo&#8217;, &#8216;svf&#8217;, &#8216;svg&#8217;, &#8216;sxc&#8217;, &#8216;sxd&#8217;, &#8216;sxg&#8217;, &#8216;sxi&#8217;, &#8216;sxm&#8217;, &#8216;sxw&#8217;, &#8216;tab&#8217;, &#8216;tcx&#8217;, &#8216;tdf&#8217;, &#8216;tdt&#8217;, &#8216;tex&#8217;, &#8216;thp&#8217;, &#8216;tlb&#8217;, &#8216;tlc&#8217;, &#8216;tmd&#8217;, &#8216;tmv&#8217;, &#8216;tmx&#8217;, &#8216;tne&#8217;, &#8216;tpc&#8217;, &#8216;trm&#8217;, &#8216;tvj&#8217;, &#8216;udb&#8217;, &#8216;ufr&#8217;, &#8216;unx&#8217;, &#8216;uof&#8217;, &#8216;uop&#8217;, &#8216;uot&#8217;, &#8216;upd&#8217;, &#8216;usr&#8217;, &#8216;vbr&#8217;, &#8216;vbs&#8217;, &#8216;vct&#8217;, &#8216;vdb&#8217;, &#8216;vdi&#8217;, &#8216;vec&#8217;, &#8216;vmx&#8217;, &#8216;vnt&#8217;, &#8216;vpd&#8217;, &#8216;vrm&#8217;, &#8216;vrp&#8217;, &#8216;vsd&#8217;, &#8216;vsm&#8217;, &#8216;vue&#8217;, &#8216;wbk&#8217;, &#8216;wcf&#8217;, &#8216;wdb&#8217;, &#8216;wgz&#8217;, &#8216;wks&#8217;, &#8216;wpa&#8217;, &#8216;wpd&#8217;, &#8216;wpg&#8217;, &#8216;wps&#8217;, &#8216;wpt&#8217;, &#8216;wpw&#8217;, &#8216;wri&#8217;, &#8216;wsc&#8217;, &#8216;wsd&#8217;, &#8216;wsh&#8217;, &#8216;wtx&#8217;, &#8216;xar&#8217;, &#8216;xdb&#8217;, &#8216;xlc&#8217;, &#8216;xld&#8217;, &#8216;xlf&#8217;, &#8216;xlm&#8217;, &#8216;xls&#8217;, &#8216;xlt&#8217;, &#8216;xlw&#8217;, &#8216;xps&#8217;, &#8216;xwp&#8217;, &#8216;xyp&#8217;, &#8216;xyw&#8217;, &#8216;ybk&#8217;, &#8216;zdb&#8217;, &#8216;zdc&#8217;]<br>3-bit extensions for large-size files&iuml;&frac14;&scaron; [&#8216;arc&#8217;, &#8216;asf&#8217;, &#8216;avi&#8217;, &#8216;bak&#8217;, &#8216;bmp&#8217;, &#8216;fla&#8217;, &#8216;flv&#8217;, &#8216;gif&#8217;, &#8216;iso&#8217;, &#8216;jpg&#8217;, &#8216;mid&#8217;, &#8216;mkv&#8217;, &#8216;mov&#8217;, &#8216;mpg&#8217;, &#8216;paq&#8217;, &#8216;png&#8217;, &#8216;rar&#8217;, &#8216;swf&#8217;, &#8216;tar&#8217;, &#8216;tbk&#8217;, &#8216;tgz&#8217;, &#8216;tif&#8217;, &#8216;vcd&#8217;, &#8216;vob&#8217;, &#8216;wav&#8217;, &#8216;wma&#8217;, &#8216;wmv&#8217;, &#8216;zip&#8217;]<br>4-bit extensions for small-size files [&#8216;agif&#8217;, &#8216;albm&#8217;, &#8216;apng&#8217;, &#8216;awdb&#8217;, &#8216;bean&#8217;, &#8216;cals&#8217;, &#8216;cdmm&#8217;, &#8216;cdmt&#8217;, &#8216;cdmz&#8217;, &#8216;cimg&#8217;, &#8216;clkw&#8217;, &#8216;colz&#8217;, &#8216;djvu&#8217;, &#8216;docb&#8217;, &#8216;docm&#8217;, &#8216;docx&#8217;, &#8216;docz&#8217;, &#8216;dotm&#8217;, &#8216;dotx&#8217;, &#8216;dtsx&#8217;, &#8216;emlx&#8217;, &#8216;epsf&#8217;, &#8216;fdxt&#8217;, &#8216;fodt&#8217;, &#8216;fpos&#8217;, &#8216;fwdn&#8217;, &#8216;gcdp&#8217;, &#8216;gdoc&#8217;, &#8216;gfie&#8217;, &#8216;glox&#8217;, &#8216;grob&#8217;, &#8216;gthr&#8217;, &#8216;icon&#8217;, &#8216;icpr&#8217;, &#8216;idea&#8217;, &#8216;info&#8217;, &#8216;itdb&#8217;, &#8216;java&#8217;, &#8216;jbig&#8217;, &#8216;jbmp&#8217;, &#8216;jfif&#8217;, &#8216;jrtf&#8217;, &#8216;kdbx&#8217;, &#8216;mbox&#8217;, &#8216;mgcb&#8217;, &#8216;mgmf&#8217;, &#8216;mgmt&#8217;, &#8216;mgmx&#8217;, &#8216;mgtx&#8217;, &#8216;mmat&#8217;, &#8216;mrxs&#8217;, &#8216;oplc&#8217;, &#8216;pano&#8217;, &#8216;pict&#8217;, &#8216;pjpg&#8217;, &#8216;pntg&#8217;, &#8216;pobj&#8217;, &#8216;potm&#8217;, &#8216;potx&#8217;, &#8216;ppam&#8217;, &#8216;ppsm&#8217;, &#8216;ppsx&#8217;, &#8216;pptm&#8217;, &#8216;pptx&#8217;, &#8216;psdx&#8217;, &#8216;psid&#8217;, &#8216;rctd&#8217;, &#8216;riff&#8217;, &#8216;scad&#8217;, &#8216;sdoc&#8217;, &#8216;sldm&#8217;, &#8216;sldx&#8217;, &#8216;svgz&#8217;, &#8216;text&#8217;, &#8216;utxt&#8217;, &#8216;vsdm&#8217;, &#8216;vsdx&#8217;, &#8216;vstm&#8217;, &#8216;vstx&#8217;, &#8216;wire&#8217;, &#8216;wmdb&#8217;, &#8216;xlgc&#8217;, &#8216;xlsb&#8217;, &#8216;xlsm&#8217;, &#8216;xlsx&#8217;, &#8216;xltm&#8217;, &#8216;xltx&#8217;, &#8216;zabw&#8217;]<br>4-bit extensions for large-size files&iuml;&frac14;&scaron; [&#8216;jpeg&#8217;, &#8216;mpeg&#8217;, &#8216;tiff&#8217;, &#8216;vmdk&#8217;]<br>5-bit extensions for small-size files&iuml;&frac14;&scaron; [&#8216;accdb&#8217;, &#8216;class&#8217;]<\/p>\n<\/div><\/div>\n\n\n\n<p><strong>2.  Summary of signatures and behaviors in captured samples<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Key APIs of process injection<br>NtAllocateVirtualMemory&atilde;&euro;NtWriteVirtualMemory&atilde;&euro;NtProtectVirtualMemory&atilde;&euro;NtCreateThreadEx&atilde;&euro;NtResumeThread<\/li><li>Key APIs of encryption<br>CryptAcquireContextW&atilde;&euro;CryptGenRandom&atilde;&euro;CryptImportKey&atilde;&euro;CryptSetKeyParam&atilde;&euro;CryptEncrypt&atilde;&euro;NtCreateFile&atilde;&euro;NtQueryInformationFile&atilde;&euro;NtReadFile&atilde;&euro;NtWriteFile<\/li><li>Modify the default registry<br>&acirc;&euro;&oelig;HKCU\\SOFTWARE\\Classes\\AppX04g0mbrz4mkc6e879rpf6qk6te730jfv\\Shell\\open\\command&acirc;&euro;to&acirc;&euro;&oelig;wscript.exe \/B \/ E:VBScript.Encode ..\/..\/Users\/Public\/%RandomString%.rdb&acirc;&euro;<\/li><li>Use cmd.exe to create fodheler.exe process<\/li><\/ol>\n\n\n\n<p><strong>3.  IOCs<\/strong><\/p>\n\n\n\n<p>HASH list of published sample files:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>934cfeb5ee3d2ba49831d76dffb1a2658326e1cd90b50779d6670eb2fbdc7ed1<\/p>\n\n\n\n<p>6155453a58b0ba360fd18a32d838c4452fec374c364824b50447500c8fd12e80<\/p>\n\n\n\n<p>5b2a5ac50977f41ac27590395bb89c1afd553e58f2979b680d545bff1530a17b<\/p>\n\n\n\n<p>79590d91e9131918df458221e8fcb9c5e33d0200f05f9704dcf88167a5515b3f<\/p>\n\n\n\n<p>7064eab88837bc68b8c5076300170cd73dbea046c9594b588779082396dbfe4c<\/p>\n\n\n\n<p>a292ff42e0e1b58b13c867d2c94da2a5d34caa2e9c30b63610f7e12be5e7d3d9<\/p>\n\n\n\n<p>dfa32d8ed7c429b020c0581148a55bc752c35834d7a2b1bae886f2b436285c94<\/p>\n\n\n\n<p>c1d1402226179c66570d66290dff2238b6a9f918c81267a61d58f4807f0d911c<\/p>\n\n\n\n<p>56fb0d5e2e216f2b4d9846517d9ed23b69fba4f19f2bad71cdce47d9081642eb<\/p>\n\n\n\n<p>92ec900b0aa0f8a335cf63d4f313729da2831ffc7d15985adf2d98f2c85c3783<\/p>\n\n\n\n<p>c7729a7817a3d63f71d6c9066bd87192d07992ae57fc3d3e6d0e67c5ab9fb213<\/p>\n\n\n\n<p>9d665f87440c22e3ae209308e3712a83a67932643be019e18b1ae00dc4ab8cbd<\/p>\n\n\n\n<p>b12461bdd88bb2a7f56d11324272ae2a766d560371b2725be6f9d3175fb32f8c<\/p>\n\n\n\n<p>abeec5267f6eb9fc9f01f4688a53e83c87898845767b8cd8599c75dbce1766a8<\/p>\n\n\n\n<p>aeee31c3649724686cb9ad17fe1ee2b70b1ad1b6cd77cb8b1997aa6e75d49cc5<\/p>\n\n\n\n<p>1eba630a870ce1aa840219d77e280cfd05d3d5e5cdea6f382c1c2b8b14ddf04d<\/p>\n\n\n\n<p>54a5b06060639a483a8f6c80c8f095fb41e3eb5e7c02c3ad4ba29ee3a9ed7aab<\/p>\n\n\n\n<p>76c012f134e81138fb37ac3638488f309662efcc9bb4011ff8e54869f26bb119<\/p>\n\n\n\n<p>56d301fe7a6b1a9e21898162b0dada9ff12878c539591052919fabcc36d28541<\/p>\n\n\n\n<p>4936cf896d0e76d6336d07cc14fbe8a99fbe10ad3e682dbc12fdfe7070fd1b24<\/p>\n\n\n\n<p>6a68217b951f9655e4a7ed13fcfc4696ac5d231450fe7d2be8b6a1d71425752c<\/p>\n\n\n\n<p>05cf26eaea577417804075a2458ac63f58a56b7612653d3a4c2ce8fa752bd418<\/p>\n\n\n\n<p>266f930572d3006c36ba7e97b4ffed107827decd7738a58c218e1ae5450fbe95<\/p>\n\n\n\n<p>9095bbb4b123a353a856634166f193124bdc4591cb3a38922b2283acc1d966d6<\/p>\n\n\n\n<p>98d96f56deaec6f0324126fcdd79fd8854d52ac2996d223d0cb0ab4cff13ff7c<\/p>\n\n\n\n<p>0c5956b7f252408db7e7b0195bb5419ad3b8daa45ec1944c44e3ec1cca51920f<\/p>\n\n\n\n<p>c4f9dbff435d873b4e8ecbab8c1b7d2dbdb969ac75af4b1d325e06eb4e51b3ad<\/p>\n\n\n\n<p>5472bce876d0758fb1379260504b791a3b8c95b87fc365f5ce8c3a6424facd34<\/p>\n\n\n\n<p>d0375fc9cbb564fb18e0afea926c7faf50464b9afb329913dd5486c7cbb36e2e<\/p>\n\n\n\n<p>ad89fb8819f98e38cddf6135004e1d93e8c8e4cba681ba16d408c4d69317eb47<\/p>\n\n\n\n<p>99f0e7f06831c6283f5f4dc261a7bcbe4109b4a6717b534c816ca65cd2f05dc4<\/p>\n\n\n\n<p>b81f76bd5c6e66b9b3a4f2828e58d557091475bed656c9a8d13c8c0e4b7f3936<\/p>\n\n\n\n<p>c6f1da2490fe78b1f281a98c32d6fa88d675598e658d4e660274047e36f1b189<\/p>\n\n\n\n<p>dd30688a0e5ac08fc547f44b60f13ef664654c9a8977f7a5f8f619b08c09620b<\/p>\n\n\n\n<p>c0bf9153ce1641791b357fdb5c2c596fbbf15991a86f510cc444bdb477574d44<\/p>\n\n\n\n<p>bf50794c33eebc9dc2ce3902fe29f683a37da50de3654a2775baa74d0bbd1188<\/p>\n\n\n\n<p>b8e76ad7c7857d9985b15dcd064664d198db7201cb9eb6a0e53d81b6002f7d29<\/p>\n\n\n\n<p>cc1ce8c687450b082dd19a6c5d868f5798e52422172f91ee4b70cb5ffd9f6fcd<\/p>\n\n\n\n<p>a587172f1bbe665cdfc0cbcec54e72d8b9048c77f344ba5076a17fbf620597de<\/p>\n\n\n\n<p>c4560eee4b02dc0ef087e48848cc83b270068d167f613f04d43a64025e72c09f<\/p>\n\n\n\n<p>82fcea3c48509a1724c0a6ded9e3d3cab775a86588119c35b79355105bd828c4<\/p>\n\n\n\n<p>e993e4ddd05007e62e6e2d00e70927933446ff4bcae2b559bb6be3bc5e4ad2d8<\/p>\n\n\n\n<p>5b513dfd8f94f9b6e962eb691caa56d52ab4453369108ae3b572e2ee7f9b555d<\/p>\n\n\n\n<p>d2d3fbfa73dfeb73a6f5c59fefab8dd99dcff58cefeb0d3b3b1c1a8854178933<\/p>\n\n\n\n<p>d80d90ef631bb60b773bf1211f3c53c1cac043674c85eb65dbc457656ba5d4cc<\/p>\n\n\n\n<p>757cd5b65155cd115b71021685fcc52a42ee80aca247ea68f41aa0d82dc20fc0<\/p>\n\n\n\n<p>bba85d79db69db1b638e24e0a426ccccdc5c95875b8c3a26aa959cce3f6c8575<\/p>\n\n\n\n<p>beb5e1c5ba835f29e272b2942b27b63f6f15647f3da51754fcf53c277e0eccf7<\/p>\n\n\n\n<p>f41ec94f9d0c7480df2196b3fc5493599d50de222d2c903b173db3e7caff8747<\/p>\n\n\n\n<p>397aa7bcc4a574dc30f0a491e03be15da55fa898624c7b15d0197e72802d048d<\/p>\n\n\n\n<p>6b18a287aa2c170605409a4675fd600d0597623d174445aaea5a2279bee0c145<\/p>\n\n\n\n<p>46d8d6230083254fa324299fc609125ee404e4bbdd3936ddc0235ae21479b655<\/p>\n\n\n\n<p>e8663c5c28d8591f06eb7995e0f22b7ae7909f9431786f8557f2c081e0e79fad<\/p>\n\n\n\n<p>d3f626d3e533f3b4aa0599c231210d53f709c46f0cfc3d28f0303df544a39b1b<\/p>\n\n\n\n<p>814061567356daf6306eb673cfb97cab264c798320bf1b432d396b66393adf83<\/p>\n\n\n\n<p>2c93879d024238d23270fab734a5ba530bfba2d35b44d265c8be3c93ff8cf463<\/p>\n\n\n\n<p>3055baf30466f1c0f4cd5b78d05fe32ef7fd406dead3ecfcbdef464fdee551b8<\/p>\n\n\n\n<p>568e1e3d55a6146f0f899159c3a5183362b8b13304109b49f7394a9fe8c69ea7<\/p>\n\n\n\n<p>932d2330dc3c1366a8e956183858246c4052027cae1590d2211186be648fdcf4<\/p>\n\n\n\n<p>dfabd6462ab2ecb9fb0cea7caa257841a751c1e91118168ef5a082cf8a25210f<\/p>\n\n\n\n<p>fbd69303e6255aae830daba957c8ef62eb6d23340274eb8058826a08e82773db 123d7744a407af376b4ee4402ff8bee588b40540bcfba22fb64768d1de8c1861<\/p>\n<\/div><\/div>\n\n\n\n<p>Published domain names:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>totwo[.]pw<\/p>\n\n\n\n<p>ittakes[.]fun<\/p>\n\n\n\n<p>catat[.]site<\/p>\n\n\n\n<p>tinpick[.]online<\/p>\n\n\n\n<p>pirlay[.]fun<\/p>\n\n\n\n<p>buyaims[.]online<\/p>\n\n\n\n<p>orhung[.]space actred[.]site<\/p>\n<\/div><\/div>\n\n\n\n<p><strong>Reference<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>https:\/\/threatresearch.ext.hp.com\/magniber-ransomware-switches-to-javascript-targeting-home-users-with-fake-software-updates\/<\/li><li>https:\/\/github.com\/med0x2e\/GadgetToJScript<\/li><li>https:\/\/winscripting.blog\/2017\/05\/12\/first-entry-welcome-and-uac-bypass\/<\/li><\/ul>\n\n\n\n<p class=\"has-small-font-size\"><strong>Statement<\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\">This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<p><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Overview The Magniber is a notorious ransomware. Unlike the common ransomware families such as Hive and LockBit that target companies, it is primarily used to blackmail individuals with a relatively low ransom around USD 2,500. The Magniber ransomware can neither be transmitted automatically nor used to upload user files, but encrypt files only. Here listed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":21856,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[504],"class_list":["post-21822","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-magniber-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview The Magniber is a notorious ransomware. Unlike the common ransomware families such as Hive and LockBit that target companies, it is primarily\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-26T08:57:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/stock-image-412698348-XL-scaled-e1666774445940.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview The Magniber is a notorious ransomware. Unlike the common ransomware families such as Hive and LockBit that target companies, it is primarily\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/stock-image-412698348-XL-scaled-e1666774445940.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware\",\"datePublished\":\"2022-10-26T08:57:37+00:00\",\"dateModified\":\"2026-04-17T18:07:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/\"},\"wordCount\":3102,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/stock-image-412698348-XL-scaled-e1666774445940.jpg\",\"keywords\":[\"Magniber ransomware;\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/\",\"name\":\"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/stock-image-412698348-XL-scaled-e1666774445940.jpg\",\"datePublished\":\"2022-10-26T08:57:37+00:00\",\"dateModified\":\"2026-04-17T18:07:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/stock-image-412698348-XL-scaled-e1666774445940.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/stock-image-412698348-XL-scaled-e1666774445940.jpg\",\"width\":300,\"height\":212,\"caption\":\"Laptop screen displaying ransomware alert message.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware - NSFOCUS","og_description":"Overview The Magniber is a notorious ransomware. Unlike the common ransomware families such as Hive and LockBit that target companies, it is primarily","og_url":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/","og_site_name":"NSFOCUS","article_published_time":"2022-10-26T08:57:37+00:00","article_modified_time":"2026-04-17T18:07:43+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/stock-image-412698348-XL-scaled-e1666774445940.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware - NSFOCUS","twitter_description":"Overview The Magniber is a notorious ransomware. Unlike the common ransomware families such as Hive and LockBit that target companies, it is primarily","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/stock-image-412698348-XL-scaled-e1666774445940.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"12 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware","datePublished":"2022-10-26T08:57:37+00:00","dateModified":"2026-04-17T18:07:43+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/"},"wordCount":3102,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/stock-image-412698348-XL-scaled-e1666774445940.jpg","keywords":["Magniber ransomware;"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/","url":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/","name":"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/stock-image-412698348-XL-scaled-e1666774445940.jpg","datePublished":"2022-10-26T08:57:37+00:00","dateModified":"2026-04-17T18:07:43+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/stock-image-412698348-XL-scaled-e1666774445940.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/stock-image-412698348-XL-scaled-e1666774445940.jpg","width":300,"height":212,"caption":"Laptop screen displaying ransomware alert message."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/stay-alert-to-traps-in-updates-a-new-variant-of-magniber-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Stay Alert to Traps in Updates: A New Variant of Magniber Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/21822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=21822"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/21822\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/21856"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=21822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=21822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=21822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}