Obfuscating a Redirection URL
I received a spam email that asked me to open an attached file, preferably "open with Internet Explorer," it said. Of course I can not resist, but I opened the file with a text editor. (You should never open suspicious email attachments. I do it because I am a daredevil.)
The attachment had JavaScript code that generated a redirection URL. If the URL to this Russian website were written in the clear, virus scanners could easily detect and block the email. 代わりに, this URL was encoded into an array, など:
A modulus function operated on each element of this array and then formed the character:
The modulus function allows the spammer to change the body of the email attachment without changing the URL, because the modulus operator will produce the same result for different inputs.
The simplest way to identify the URL is to execute the script in an online interpreter, which generated:
As with many spam-loaded website, this domain was registered one day before I received the spam.
コメントする最初の人になる. コメントを残す