PRSADSRXSIRAX
Apr 30th, 2025 (edited)
3
0
Never
This is comment for paste Untitled
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Yes β€” this script is highly suspicious and likely malicious or phishing-related, just like the one you shared earlier.
  2.  
  3. πŸ” Why This Is Suspicious / Malicious
  4. 🚨 Auto-generated Fake Order ID
  5.  
  6. js
  7.  
  8. const orderId = "ORD-" + Math.random().toString(36)...
  9. Fakes a seemingly valid order ID to simulate a legitimate transaction.
  10.  
  11. πŸ” Exposed Secret API Key
  12.  
  13. js
  14.  
  15. "Authorization": "Bearer sk_live_xr7u8ghs1k2as91"
  16. API keys like this should never be public.
  17.  
  18. This key could be:
  19.  
  20. Stolen from a service
  21.  
  22. Fake, used to trick you into trusting the request
  23.  
  24. Harvested if someone runs the script locally
  25.  
  26. πŸ“₯ Hidden Redirection via Base64
  27.  
  28. js
  29.  
  30. const secret = 'aHR0cHM6Ly9kcml2ZS5nb29nbGUuY29tL2ZpbGUvZC8xOFpf...';
  31. const finalURL = decode(secret);
  32. window.open(finalURL, '_self');
  33. Base64-decoded string redirects the user to:
  34.  
  35. bash
  36.  
  37. https://drive.google.com/file/d/18Z_Cotv5Cb1XBG1HWpivJOEXiCu0rgMk/view
  38. This is a file hosted on Google Drive β€” often used in phishing and malware distribution because:
  39.  
  40. It bypasses some filters
  41.  
  42. Google Drive links look trustworthy
  43.  
  44. πŸ§ͺ Fake Order Verification + Logging
  45.  
  46. js
  47.  
  48. verifyOrder(...);
  49. logEvent(...);
  50. This pretends to verify an order and log an event.
  51.  
  52. It’s likely just smoke and mirrors β€” it does nothing meaningful but creates the illusion of legitimate backend activity.
  53.  
  54. 🧨 Conclusion
  55. Yes β€” this is likely part of a phishing scam or malware distribution technique.
  56.  
  57. It tries to:
  58.  
  59. Pretend to verify an order
  60.  
  61. Redirect the user to a suspicious file on Google Drive
  62.  
  63. Possibly log their activity or trick them into interacting with malicious content
  64.  
  65.  
Add Comment
Please, Sign In to add comment