Skip to main content

Exploring a Recent Magnitude Exploit Kit Sample


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
By Jessie Leung | October 09, 2019
A FortiGuard Labs Threat Analysis

As Internet Explorer's share of the browser pie continues to shrink, exploit kits — frameworks hosted by malicious actors to target browser vulnerabilities, particularly for IE — are much less active than before. However, some of them now target geographic regions where IE owns a more sizable part of the market.

Magnitude Exploit Kit is one that continues to target South Korea. At FortiGuard Labs, we discovered a sample that was using a specific technique with VBScript to load the .NET assembly from memory.
The flow for this sample was as follows:

  1. Ad network 302 redirection
  2. Magnitude EK 'gate' containing obfuscated JS
  3. Redirection to a second domain with a VBScript exploit (CVE-2018-8174) and .NET payload


The intermediate page just contains base64 encoded JavaScript.

Full Article.

Reply