Obfuscating a Redirection URL

I received a spam email that asked me to open an attached file, preferably "open with Internet Explorer," it said. Of course I can not resist, but I opened the file with a text editor. (You should never open suspicious email attachments. I do it because I am a daredevil.)

The attachment had JavaScript code that generated a redirection URL. If the URL to this Russian website were written in the clear, virus scanners could easily detect and block the email. 代わりに, this URL was encoded into an array, など:

f=new Array(118,96,112,49,60,(snip), 125)

A modulus function operated on each element of this array and then formed the character:


The modulus function allows the spammer to change the body of the email attachment without changing the URL, because the modulus operator will produce the same result for different inputs.

The simplest way to identify the URL is to execute the script in an online interpreter, which generated:


As with many spam-loaded website, this domain was registered one day before I received the spam.

警告: Do not open suspicious attachments or attempt to run a similar script in an actual web browser. You will only infect your computer.
October 26th, 2012 投稿者 ジョンJaroker に提出された: Exploits

コメントする最初の人になる. コメントを残す

あなたのメールアドレスは公開されません. 必須フィールドがマークされている *