generic_javascript_obfuscation5 in www.fundacioncanal.com

On 2020-06-30T20:20:09.573798+00:00 we found pattern generic_javascript_obfuscation5, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://www.fundacioncanal.com/wp-conte… referenced from https://www.fundacioncanal.com/ .

Code sample:

b'["width","height","state","\xc2\xa6V\xc2\xb2\xc2\x96+-","item","\xc2\xa6\xc2\x8b"\xc2\xb6*\'","buffer","v\xc3\xaa\xc3\x9a\xc2\xb6*\'","volume","mute",' … b'["width","height","start","v\xc3\xaa\xc3\x9a\xc2\xb6*\'","volume","mute","fullscreen","item","plugins",'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!