PossibleShellcodePattern in www.olivn.com

On 2019-11-27T11:42:29.112917+00:00 we found suspicious pattern PossibleShellcodePattern, type: Suspicious, (Sequence of JavaScript unescaped binary characters that may be an attempt to load a shellcode) in the page https://www.olivn.com/

The suspicious code sample:

b'= unescape("%0A%0A%0A%0A%0A%0A%0A%0A%0A%0A%0A%0A")' … b'unescape' … b'unescape'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!