generic_javascript_obfuscation in maps.google.com

On 2020-03-25T22:14:17.147165+00:00 we found pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://maps.google.com/maps-api-v3/a... referenced from http://ampagency.com/ .

Code sample:

b'\\x00' … b'\\x00' … b'\\x00' … b'\\x21' … b'\\x2f' … b'\\x40' … b'\\x47' … b'\\x60' … b'\\x67' … b'\\x7e' … b'\\x00' … b'\\x21' … b'\\x2f' … b'\\x40' … b'\\x47' … b'\\x60' … b'\\x67' … b'\\x7e' … b'atob' … b'"ClientIdLooksLikeCryptoKey"' … b'"KeyLooksLikeCryptoKey"' … b'"KeyLooksLikeProjectNumber"' … b'"EeEemSbbieebEmSiMmmmm"' … b'"mmmmmmmmmmm13mmmmmmmm"'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!