generic_javascript_obfuscation in www.googletagmanager.com

On 2020-03-26T09:11:05.285326+00:00 we found pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://www.googletagmanager.com/gtm.... referenced from https://tekno.utopiathesoftware.com/ .

Code sample:

b'\\x00' … b'\\x08' … b'\\x0b' … b'\\x22' … b'\\x26' … b'\\x27' … b'\\x85' … b'\\x24' … b'\\x28' … b'\\x29' … b'\\x2a' … b'\\x2b' … b'\\x2e' … b'\\x5b' … b'\\x5e' … b'\\x7b' … b'atob' … b'"ABCDEFGHIJKLMNOPQRSTUVWXYZ"' … b'"getReferrerQueryParameters"' … b'"getUntrustedUpdateValue"' … b'"webkitMatchesSelector"' … b'"onYouTubeIframeAPIReady"' … b'"onYouTubeIframeAPIReady"' … b'"interactedFormFieldPosition"' … b'"interactSequenceNumber"'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!