Javascript Logic Obfuscation

Hi Reverser,

Let’s do some stuff. Today I would like to share again about the malware evasion technique. Today, it is a bit different, where it is not about executable, but it is good to know about. I would like to share about javascript evasion technique using obfuscation to bypass some protection control

The researcher has developed many techniques, but I would like to share the basic one. This obfuscation is very effective in bypassing the protection control since it impacts the flow of the code

Logic Structure Obfuscation

This type of obfuscation technique manipulates the execution paths of JavaScript codes by changing the logic structure without affecting the original semantics.

There are two ways to implement logic structure obfuscation. The easiest one is to insert some instruction that is independent of the functionality. The other one is to add or change some conditional branches, such as if … else, switch…case, for, while.

  1. Conditional Branches

We can see the payload highlighted above is executed once during the code execution with a different logic flow. So the Antivirus need to anticipate both types of code which is very hard because there are unlimited ways to achieve the same objective

2. Independent Instruction

We insert some independent code that has nothing to do with the payload itself. The objective of executing the payload once during code execution is still the same

Manipulating the code logic structure to achieve the same payload execution effectively bypasses the antivirus engine. It gives shallow detection confidence to the protection to block the malware

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s