Scanned pages/files
Request | Server response | Status |
http://www.bontmutsen.com/ | 200 OK Content-Length: 15337 Content-Type: text/html | suspicious |
Suspicious code. Script contains iFrame. document.write(unescape('%3C%62%6F%64%79%3E%3C%73%63%72%69%70%74%20%74%79%70%65%3D%22%74%65%78%74%2F%6A%61%76%61%73%63%72%69%70%74%22%3E%41%4E%43%48%4F%52%46%52%45%45%5F%56%45%52%53%49%4F%4E%3D%22%36%32%33%31%36%31%35%32%36%22%3C%2F%73%63%72%69%70%74%3E%3C%73%63%72%69%70%74%20%74%79%70%65%3D%27%74%65%78%74%2F%6A%61%76%61%73%63%72%69%70%74%27%3E%28%66%75%6E%63%74%69%6F%6E%28%29%7B%69%66%28%74%79%70%65%6F%66%28%5F%41%46%32%24%72%75%6E%6E%65%64% ...[3552 bytes skipped]... Decoded script: ...[4240 bytes skipped]... ck">..::: We are Muslim Hacker :::.. <br> ..::: Feel The Power Of Muslim :::.. <br> [+] Our Official Members [+] <br> <font color="Green">..::: Sec_d@rk [!] Dark Root [!] 3XPL0173R~X3D [!] rEd mini [!] Dark HeArt Afghan [!] 0wl_Ey3 :::.. <br> ..::: xc0d30ffx [!] Bl@ck L!on [!] Kazi Shaheb [!] H1d3n Root :::.. </div>© 2015 </div> </div> </div> </div> <iframe width="0" height="0" scrolling="no" frameborder="no" src="https://www.youtube.com/embed/2m913fFLBos?autoplay=1&loop=1"></iframe> </body> </html> Deface/Content modification. The following signature was found: Hacked by Team_CC <!DOCTYPE html>
<!--[if lt IE 7 ]><html class="ie ie6" lang="en"> <![endif]--> <!--[if IE 7 ]><html class="ie ie7" lang="en"> <![endif]--> <!--[if IE 8 ]><html class="ie ie8" lang="en"> <![endif]--> <!--[if (gte IE 9)|!(IE)]><!--> <html lang="en"> <!--<![endif]--> <head> <meta charset="utf-8"> <title> Hacked by Team_CC </title> <meta http-equiv="Content-Type" content="text/html; charset=utf8" /> <meta name="Author" content="Dr.D3M0N"/> <meta name="copyright" content="Dr.D3M0N"/> <meta name="description" content="Hacked by Dr.D3M0N/> <meta name="keywords" content="Hacked by Team_CC, Hacked by Dr.D3M0N, Dr.D3M0N"/> <meta name="robots" content="ARCHIVE"/> <meta na ...[15040 bytes skipped]... | ||
http://goo.gl/ijGD6 | HTTP/1.1 301 Moved Permanently Cache-Control: no-cache, no-store, max-age=0, must-revalidate Connection: close Date: Sat, 28 Nov 2015 15:36:29 GMT Pragma: no-cache Accept-Ranges: none Location: http://peterjepimarsblog.googlecode.com/files/mousegetar.js Server: GSE Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Expires: Fri, 01 Jan 1990 00:00:00 GMT X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block | clean |
http://peterjepimarsblog.googlecode.com/files/mousegetar.js | 200 OK Content-Length: 6974 Content-Type: text/plain | clean |
http://peterjepimarsblog.googlecode.com/test404page.js | 404 Not Found Content-Length: 1575 Content-Type: text/html | clean |
http://peterjepimarsblog.googlecode.com//www.google.com/ | 404 Not Found Content-Length: 1561 Content-Type: text/html | clean |
http://www.bontmutsen.com//www.google.com/ | 200 OK Content-Length: 15337 Content-Type: text/html | suspicious |
Suspicious code. Script contains iFrame. document.write(unescape('%3C%62%6F%64%79%3E%3C%73%63%72%69%70%74%20%74%79%70%65%3D%22%74%65%78%74%2F%6A%61%76%61%73%63%72%69%70%74%22%3E%41%4E%43%48%4F%52%46%52%45%45%5F%56%45%52%53%49%4F%4E%3D%22%36%32%33%31%36%31%35%32%36%22%3C%2F%73%63%72%69%70%74%3E%3C%73%63%72%69%70%74%20%74%79%70%65%3D%27%74%65%78%74%2F%6A%61%76%61%73%63%72%69%70%74%27%3E%28%66%75%6E%63%74%69%6F%6E%28%29%7B%69%66%28%74%79%70%65%6F%66%28%5F%41%46%32%24%72%75%6E%6E%65%64% ...[3552 bytes skipped]... Decoded script: ...[4240 bytes skipped]... ck">..::: We are Muslim Hacker :::.. <br> ..::: Feel The Power Of Muslim :::.. <br> [+] Our Official Members [+] <br> <font color="Green">..::: Sec_d@rk [!] Dark Root [!] 3XPL0173R~X3D [!] rEd mini [!] Dark HeArt Afghan [!] 0wl_Ey3 :::.. <br> ..::: xc0d30ffx [!] Bl@ck L!on [!] Kazi Shaheb [!] H1d3n Root :::.. </div>© 2015 </div> </div> </div> </div> <iframe width="0" height="0" scrolling="no" frameborder="no" src="https://www.youtube.com/embed/2m913fFLBos?autoplay=1&loop=1"></iframe> </body> </html> |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: bontmutsen.com
Result:
GET / HTTP/1.1
Host: bontmutsen.com
Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: bontmutsen.com
Referer: http://www.google.com/search?q=bontmutsen.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: bontmutsen.com
Referer: http://www.google.com/search?q=bontmutsen.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=bontmutsen.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://bontmutsen.com/
Result: bontmutsen.com is not infected or malware details are not published yet.
Result: bontmutsen.com is not infected or malware details are not published yet.