I ran "Sucuri SiteCheck" in one site that im working and the sitecheck reported the following code as malware:
Known javascript malware.
Details:
code:
var i,y,x="3c646976207374796c653d22706f736974696f6e3a6162736f6c7574653b6c6566743a3070783b746f703a3070783b7669736962696c6974793a68696464656e3b222069643d2264617461646976223e3c696d67207372633d2267706c75732e637322206865696768743d2230222077696474683d2230223e3c2f696d673e3c2f6469763e";y='';for(i=0;i<x.length;i+=2){y+=unescape('%'+x.substr(i,2));}document.write(y);</script></aside><aside id="bp-4" class="WP"><script language="JavaScript" type="text/javascript">//
After search I found this code in one file
"<script language=\"JavaScript\" type=\"text/javascript\">//\nvar i,y,x=\"$hex_string\";y='';for(i=0;i<x.length;i+=2){y+=unescape('%'+x.substr(i,2));}document.write(y);</script>"
Someone can tell me what this code do, and it is really malicious ?
Thank you very much!
Best Regards!
It looks like Sucuri SiteCheck doesn't like the way it was obfuscated. Decoding it as hex, it is:
<div style="position:absolute;left:0px;top:0px;visibility:hidden;" id="datadiv">
<img src="gplus.cs" height="0" width="0">
</img>
</div>
The question as to whether or not it is malicious depends on what gplus.cs
is.