Quick & Dirty Obfuscated JavaScript Analysis

Published: 2024-11-24. Last Updated: 2024-11-24 09:22:41 UTC
by Didier Stevens (Version: 1)
0 comment(s)

As mentioned in diary entry "Increase In Phishing SVG Attachments", I have a phishing SVG sample with heavily obfuscated JavaScript.

As I didn't want to spend time doing static analysis, I did a quick dynamic analysis instead. TL;DR: I open the SVG file in a VM disconnected from the Internet, and use Edge's developer tools to view the deobuscated URL.

First I make sure the VM is disconnected from the network:

Then I open the SVG file in Edge (Chrome works too):

I open the developer tools:

I switch to the Network tab:

And then I type a dummy password and click on the Download button:

I can then view the deobfuscated URL:

And also the payload:

 

 

Didier Stevens
Senior handler
blog.DidierStevens.com

Keywords:
0 comment(s)

Comments


Diary Archives