generic_javascript_obfuscation5 in cdn.push77.com

On 2020-05-23T00:15:15.810333+00:00 we found pattern generic_javascript_obfuscation5, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://cdn.push77.com/sdk.min.js referenced from https://roiverticals.co/c_c?url=eurocur… .

Code sample:

b'["v\xc2\xba)"{-jw\x1e"],le=["clear","getItem","iterate","key","keys","length","removeItem","setItem"].concat(fe),de={description:"",driver:se.slice(),name:"localforage",size:4980736,storeName:"keyvaluepairs",' … b'["clear","getItem","iterate","key","keys","length","removeItem","setItem"].concat(fe),de={description:"",driver:se.slice(),name:"localforage",size:4980736,storeName:"keyvaluepairs",'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!