简体   繁体   中英

Malicious Code or False Positive?

I ran "Sucuri SiteCheck" in one site that im working and the sitecheck reported the following code as malware:

Known javascript malware.

Details:

http://labs.sucuri.net/db/malware/mwjs-include-unescape3?v1

code:

var i,y,x="3c646976207374796c653d22706f736974696f6e3a6162736f6c7574653b6c6566743a3070783b746f703a3070783b7669736962696c6974793a68696464656e3b222069643d2264617461646976223e3c696d67207372633d2267706c75732e637322206865696768743d2230222077696474683d2230223e3c2f696d673e3c2f6469763e";y='';for(i=0;i<x.length;i+=2){y+=unescape('%'+x.substr(i,2));}document.write(y);</script></aside><aside id="bp-4" class="WP"><script language="JavaScript" type="text/javascript">//

After search I found this code in one file

"<script language=\"JavaScript\" type=\"text/javascript\">//\nvar i,y,x=\"$hex_string\";y='';for(i=0;i<x.length;i+=2){y+=unescape('%'+x.substr(i,2));}document.write(y);</script>"

Someone can tell me what this code do, and it is really malicious ?

Thank you very much!

Best Regards!

It looks like Sucuri SiteCheck doesn't like the way it was obfuscated. Decoding it as hex, it is:

<div style="position:absolute;left:0px;top:0px;visibility:hidden;" id="datadiv">
    <img src="gplus.cs" height="0" width="0">
    </img>
</div>

The question as to whether or not it is malicious depends on what gplus.cs is.

The technical post webpages of this site follow the CC BY-SA 4.0 protocol. If you need to reprint, please indicate the site URL or the original address.Any question please contact:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM