generic_javascript_obfuscation in stream-cr7.net

On 2019-12-02T05:12:58.203244+00:00 we found suspicious pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page http://stream-cr7.net/embed/f1.php

The suspicious code sample:

b'atob' … b'atob' … b'atob' … b'atob' … b'atob' … b'atob' … b'atob' … b'atob' … b'atob' … b"'dqmno09eJ2ib7i0d0Oaoi3wbdeNvm8hdcreHucise120Xwlee59wyPe5wg76upUgyb8m3h6Wnsw3qchdPe669ayws'" … b"'y0uR4ccHle1Lg0cIx21HsocVy0uN4ccWle1Wrqj'"

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!