generic_javascript_obfuscation5 in applyonline.neurostormltd.com

On 2020-08-02T04:39:00.201218+00:00 we found pattern generic_javascript_obfuscation5, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://applyonline.neurostormltd.com/j… referenced from https://applyonline.neurostormltd.com/ .

Code sample:

b'["May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"],datasets:[{label:"Performance",data:[10,18,28,23,28,40,36,46,52],pointRadius:10,pointHoverRadius:15,showLine:!1}]}}),e.data("chart",' … b'["May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"],datasets:[{label:"Performance",data:[0,20,10,30,15,40,20,60,60]}]}}),e.data("chart",' … b'["May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"],datasets:[{label:"Performance",data:[0,20,10,30,15,40,20,60,60]}]}}),e.data("chart",' … b'["May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"],datasets:[{label:"Performance",data:[0,20,10,30,15,40,20,60,60]}]}}),e.data("chart",a))}();if($(\'[data-toggle="widget-q\xc2\xa9^\xc2\x9d\xc3\x96\xc2\xab"]\')[0]){$(\'[data-toggle="widget-q\xc2\xa9^\xc2\x9d\xc3\x96\xc2\xab"]\').fullCalendar({contentHeight:"auto",'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!