Change in Magniber Ransomware (*.cpl → *.jse) – September 8th

After Magniber changed its method of distribution from an MSI format to a CPL format on July 20th, it has been monitored to show decreased distribution activity as of mid-August. While continuously monitoring for changes, the ASEC analysis team found that the distribution format of Magniber has changed from *.CPL (DLL type) to *.JSE (script) format starting from September 8th, 2022. As Magniber is one of the most damaging ransomware to Korean users and is employing various methods to bypass anti-malware detection besides being actively distributed, users are advised to take particular caution. (Reference:

Figure 1. Previous distribution cases of the CPL file

As you can see from the figure above, the cases of using CPL files for distribution are decreasing. The attacker of Magniber likely changed the method of distribution from distributing CPL files to JSE files. The downloaded file format is different for Chrome and Edge. Inside the ZIP file downloaded from the Edge browser is the same JSE type file as the one in the downloaded file from Chrome.

  • (September 7th, 2022) system_update_win10.****************.cpl
  • (September 8th, 2022) Antivirus_Upgrade_Cloud.****************.jse (Chrome)
  • (September 8th, 2022) Antivirus_Upgrade_Cloud.****************.jse (Edge)
Figure 2. A webpage that distributes ransomware, redirected from websites for advertising or faking domains (Chrome)
Figure 3. Magniber downloaded from Edge and Chrome

The difference is thought to prevent the security policies of each browser from preventing the download.

Figure 4. Ransom note of Magniber

Magniber is currently being distributed in a typosquatting method that exploits typos made when entering URLs, targeting Chrome and Edge users with the latest Windows version. As users may download ransomware by entering incorrect domains, extra caution is required.

AhnLab is currently responding to Magniber as shown in the following:

[File Detection]
– Ransomware/JS.Magniber (2022.09.08.02)

– f63468170387166b6631bf0c851bd356

Subscribe to AhnLab’s next-generation threat intelligence platform ‘AhnLab TIP’ to check related IOC and detailed analysis information.

Categories:Malware Information

0 0 votes
Article Rating
Notify of

Inline Feedbacks
View all comments

[…] Change in Magniber Ransomware (*.cpl → *.jse) – September 8th Figure 1. Change in Magniber ransomware (*.cpl → *.jse) as of September 8th […]


[…] Change in Magniber Ransomware (*.cpl → *.jse) – September 8th […]