Generic_JavaScript_XOR_encryption in modalyssa-store.api.oneall.com

On 2020-04-21T13:15:29.997307+00:00 we found pattern Generic_JavaScript_XOR_encryption, type: Suspicious, (JavaScript XOR encryption is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://modalyssa-store.api.oneall.com/… referenced from https://www.modalyssa.store/ .

Code sample:

b'function d(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'for(' … b'.charCodeAt(' … b'.charCodeAt(' … b'.charCodeAt(' … b'.charCodeAt(' … b'f[(f[c]+f[d])%256]'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!