generic_javascript_obfuscation in qwiplay.com

On 2019-11-26T21:46:24.907356+00:00 we found suspicious pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://qwiplay.com/

The suspicious code sample:

b'atob' … b'"resourcetimingbufferfull"' … b'"requestAnimationFrame"' … b'"equestAnimationFrame"' … b"'muZDndRkuNYjewYyReYWeeY578Mga3=='" … b"'qwYmipUwlaNWycE3omZG1cQt9cZm13Vl03Ny3b006aND57A4'" … b"'qwLTipkwlaODycctomM293Jl04M25eYza9Y288ZmaaOD38k2'"

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!