Scanned pages/files
Request | Server response | Status |
http://39aurora.com/ | 200 OK Content-Length: 3802 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked By Dadou Dz <html><head>
<meta http-equiv='X-UA-Compatible' content='IE=edge'> <title>Hacked By Dadou Dz</title> <link rel='shortcut icon' href='http://62.mgl.skyrock.net/art/GRA1.48062.355.2.jpg'> <title>Dadou Dz</title> <style> <!-- SPAN.SpellE { } SPAN.SpellE { } SPAN.SpellE { } SPAN.SpellE { } SPAN.SpellE { } --> </style> <script type='text/javascript' ...[4390 bytes skipped]... | ||
http://v.zilionfast.in/1522753370/?t=vrt | HTTP/1.1 302 Moved Temporarily Connection: close Date: Mon, 11 May 2015 20:19:42 GMT Location: http://sso.anbtr.com/domain/v.zilionfast.in Server: nginx Content-Type: text/html Set-Cookie: btst=527d978440ff115bd9e6da81ea90b835|78.158.11.226|1431375582|1431375582|0|1|0 Set-Cookie: snkz=78.158.11.226 | clean |
http://sso.anbtr.com/domain/v.zilionfast.in | HTTP/1.1 302 Moved Temporarily Connection: close Date: Mon, 11 May 2015 20:16:54 GMT Location: http://xsso.v.zilionfast.in/148250eca4787d4d67288270a2f1aa30 Server: nginx Content-Type: text/html Set-Cookie: anbtr=148250eca4787d4d67288270a2f1aa30; domain=.zilionfast.in | clean |
http://xsso.v.zilionfast.in/148250eca4787d4d67288270a2f1aa30 | 200 OK Content-Length: 24 Content-Type: text/html | clean |
http://xsso.v.zilionfast.in/test404page.js | 200 OK Content-Length: 0 Content-Type: text/html | clean |
http://39aurora.com//static.getjs.net/sd/1018/1022.js/ | 404 Not Found Content-Length: 350 Content-Type: text/html | clean |
http://39aurora.com//static.getjs.net/sd/1018/1005.js/ | 404 Not Found Content-Length: 350 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: 39aurora.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Mon, 11 May 2015 20:21:25 GMT
Accept-Ranges: bytes
Server: nginx
Vary: Accept-Encoding
Content-Length: 3802
Content-Type: text/html
Last-Modified: Thu, 06 Nov 2014 20:15:55 GMT
Ngpass_ngall: 1
...3802 bytes of data.
GET / HTTP/1.1
Host: 39aurora.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Mon, 11 May 2015 20:21:25 GMT
Accept-Ranges: bytes
Server: nginx
Vary: Accept-Encoding
Content-Length: 3802
Content-Type: text/html
Last-Modified: Thu, 06 Nov 2014 20:15:55 GMT
Ngpass_ngall: 1
...3802 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: 39aurora.com
Referer: http://www.google.com/search?q=39aurora.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: 39aurora.com
Referer: http://www.google.com/search?q=39aurora.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=39aurora.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://39aurora.com/
Result: 39aurora.com is not infected or malware details are not published yet.
Result: 39aurora.com is not infected or malware details are not published yet.