obfuscated_eval in st.wgplayer.com

On 2020-01-01T11:50:41.114151+00:00 we found pattern obfuscated_eval, type: Suspicious, (Obfuscated eval() is a popular evasion technique in JavaScript malware) in the page https://st.wgplayer.com/tokoyun.com/js/… referenced from http://tokoyun.com/ .

Code sample:

b'\\x65\\x76\\x61\\x6C'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!