Malware Domain List
Malware Related => Malware Analysis => Topic started by: valkyriex on April 19, 2010, 05:51:33 pm
-
Hi fellows,
Anyone could deobfuscate the attached code? Do you mind to list out the step as I can't figure it with Malzilla indeed.
Thanks, mates.
Regards,
Anthony
-
attached.
It would take hours to explain it in details.
General guidelines:
-use "format code" to structure code
-use a second decoder tab to resolve "replace" instructions. you can do this by "eval(some_replace_instruction)". Now code is much more readable.
-transform DOM functions which Malzilla is unable to manage (getElementbyId, document.location.href)
modified script for Malzilla decoding can be found in zip file.
-
Thank you, SsyAdMini, I have replicated it with reference to your guidelines.
In fact, another method suggested by my Taiwan fellow that putting document.write and alert on the the output/return result.
For example:
document.write(mbtnpoq);
alert(mbtnpoq);
Regards,
Anthony