generic_javascript_obfuscation4 in aulavirtual.enap.edu.pe

On 2020-05-23T18:35:25.891920+00:00 we found pattern generic_javascript_obfuscation4, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://aulavirtual.enap.edu.pe/lib/req… referenced from https://aulavirtual.enap.edu.pe/ .

Code sample:

b'Math.random(' … b'Math.random(' … b'Math.random(' … b'Math.random(' … b'Math.random(' … b'Math.random(' … b'Math.random(' … b'Math.random(' … b'Math.random(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent(' … b'encodeURIComponent('

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!