generic_javascript_obfuscation in viewlnk.com

On 2019-10-05T02:10:28.122157+00:00 we found suspicious pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page http://viewlnk.com/4/2700011

The suspicious code sample:

b'atob' … b'atob' … b'atob' … b'"addQualityOptionsToForm"' … b'"addFingerprintStatusToForm"' … b'"setFingerprintIfNeeded"' … b'"HasBeenSetPreviously"' … b'"Fingerprint2JSWasGenerated"' … b'"ErrorOccurredInFingerprint2JS"' … b'"webglVendorAndRenderer"' … b'"V2ViS2l0MutationObserver"' … b'"WW91IGNhbm5vdCByZXNvbHZlIGEgcHJvbWlzZSB3aXRoIGl0self"' … b'"reverseZoneIdEncoded"'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!