badho.blogg.se

Obfuscated javascript
Obfuscated javascript









To decrypt it, we need to tweak the code a little bit so that the evil script reveals its true nature - as opposed to silently executing the payload. Some of these techniques have already been discussed in this blog. The threat is using a mixture of Codebook, XOR and substitution ciphering as well as the traditional character representation tricks to hide the malicious content. Our sample today is a 6KB obfuscated JavaScript that by the end turns into a single iframe pointing to a malicious site.

obfuscated javascript

In this blog we will analyze a sample with 5 different obfuscation layers using a few tricks to fool automated de-obfuscation engines. To avoid detection, they are using more and more complex obfuscation techniques.

obfuscated javascript obfuscated javascript

Most compromised HTML documents contain a JavaScript that generates the malicious content dynamically to make it less obvious what it is doing. Nowadays infected Web pages are probably the biggest threat to the IT sector.











Obfuscated javascript