Scanned pages/files
Request | Server response | Status |
http://mavilayibank.com/ | 200 OK Content-Length: 21178 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked By ...[16970 bytes skipped]... br/>//strat sec // end --> </script> </head> <head> </br> </head> <body style="color: #FFFFFF; background-color: #000000"> <br /> <center><img src="http://i58.tinypic.com/3163qyr.gif"></center> <br /><br /> <h2><font color="white" size="8"> Hacked By </h2> <h1>Hexlook</h1> <div id="court_not_in_session" style="text-align: center; font-family:'BebasNeueRegular', Arial, Helvetica, sans-serif; text-shadow:0 0 5px #00c6ff;"> <img src="http://i58.tinypic.com/3163qyr.gif" style="height: 63px; width: 82px;" align="center"/> <span id="not_in_session" style="font-size: 58px;">We Are Pak Cyber Attackers</span> <img src="http://i58.tinypic.com/3163qyr.g ...[8002 bytes skipped]... | ||
http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js | 200 OK Content-Length: 72174 Content-Type: text/javascript | clean |
http://jqueryrotate.googlecode.com/svn/trunk/jQueryRotate.js | 200 OK Content-Length: 13892 Content-Type: text/plain | clean |
http://jqueryrotate.googlecode.com/test404page.js | 404 Not Found Content-Length: 1439 Content-Type: text/html | clean |
http://jqueryrotate.googlecode.com//www.google.com/ | 404 Not Found Content-Length: 1425 Content-Type: text/html | clean |
http://www.p0wersurge.com/js/jquery-css-transform.js | 404 Not Found Content-Length: 3090 Content-Type: text/html | clean |
http://www.p0wersurge.com//ajax.cloudflare.com/cdn-cgi/nexp/dok3v=dccf16c0cc/appsh.min.js/ | 404 Not Found Content-Length: 3127 Content-Type: text/html | clean |
http://www.p0wersurge.com//ajax.cloudflare.com/cdn-cgi/nexp/dok3v=73806ac11c/apps1.min.js/ | 404 Not Found Content-Length: 3127 Content-Type: text/html | clean |
http://www.p0wersurge.com/js/rotate3Di.js | 404 Not Found Content-Length: 3079 Content-Type: text/html | clean |
http://mavilayibank.com/Scripts/swfobject_modified.js | 404 Not Found Content-Length: 346 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: mavilayibank.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 24 Feb 2015 02:01:08 GMT
Accept-Ranges: bytes
ETag: "1408f57-52ba-50cea38df8ed6"
Server: Apache
Vary: Accept-Encoding,User-Agent
Content-Length: 21178
Content-Type: text/html
Last-Modified: Sun, 18 Jan 2015 09:56:39 GMT
...21178 bytes of data.
GET / HTTP/1.1
Host: mavilayibank.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 24 Feb 2015 02:01:08 GMT
Accept-Ranges: bytes
ETag: "1408f57-52ba-50cea38df8ed6"
Server: Apache
Vary: Accept-Encoding,User-Agent
Content-Length: 21178
Content-Type: text/html
Last-Modified: Sun, 18 Jan 2015 09:56:39 GMT
...21178 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: mavilayibank.com
Referer: http://www.google.com/search?q=mavilayibank.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: mavilayibank.com
Referer: http://www.google.com/search?q=mavilayibank.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=mavilayibank.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://mavilayibank.com/
Result: mavilayibank.com is not infected or malware details are not published yet.
Result: mavilayibank.com is not infected or malware details are not published yet.