PossibleShellcodePattern in maps.google.com

On 2016-04-25T21:14:08.185726+00:00 we found suspicious pattern PossibleShellcodePattern, type: Suspicious, (Sequence of JavaScript unescaped binary characters that may be an attempt to load a shellcode) in the page https://maps.google.com/maps/api/js?sen… referenced from https://100kfifacoins.com/ .

The suspicious code sample:

b'=unescape("%26%74%6F%6B%65%6E%3D")' … b'=unescape("%26%6B%65%79%3D")' … b'=unescape("%26%63%6C%69%65%6E%74%3D")' … b'=unescape("%26%63%68%61%6E%6E%65%6C%3D")' … b'unescape' … b'unescape' … b'unescape' … b'unescape' … b'unescape'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!