Wednesday, July 25, 2012

JavaScript unescape obfuscated code

A quick way to decode SOME simple obfuscation of Javascript is to use the Malzilla tool, found at

Malzilla can take a string, like this one found in an “INDICATOR-OBFUSCATION Potential obfuscated javascript eval unescape attack attempt” alert, and deobfuscate it, while replacing eval with evla, to prevent the script from running (to be safer, you should run this on a virtual machine with no networking or on a test box)


Make sure when you copy this from the content data into the Decoder tab, your parenthesis match up. Once run through the tool (make sure you leave the “Replace eval with evla option enabled”), this decodes to:

This one wasn't malicious, but we didn't know that until we deobfuscated it. 

No comments:

Blog Archive