generic_javascript_obfuscation in www.scanoma.com

On 2020-01-15T02:59:59.629573+00:00 we found pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://www.scanoma.com/static/js/4.5... referenced from https://www.scanoma.com/ .

Code sample:

b'\\xb1' … b'\\xf7' … b'\\x00' … b'\\x2f' … b'\\x40' … b'\\x5b' … b'\\x60' … b'\\x7b' … b'\\xbf' … b'\\x0b' … b'\\xa0' … b'\\xf6' … b'\\xf8' … b'\\xff' … b'\\xf6' … b'\\xf8' … b'\\xff' … b'atob' … b'atob' … b'atob' … b'"initMapDispatchToProps"' … b'"componentWillReceiveProps"' … b'"getAllResponseHeaders"' … b'"onCompositionStartCapture"' … b'"onCompositionUpdateCapture"' … b'"ReactCurrentDispatcher"' … b'"externalResourcesRequired"' … b'"dangerouslySetInnerHTML"' … b'"suppressContentEditableWarning"' … b'"dangerouslySetInnerHTML"' … b'"suppressContentEditableWarning"' … b'"dangerouslySetInnerHTML"' … b'"dangerouslySetInnerHTML"' … b'"suppressContentEditableWarning"' … b'"InvalidCharacterError"' … b'"getSnapshotBeforeUpdate"' … b'"keepDirtyOnReinitialize"' … b'"persistentSubmitErrors"'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!