New scan:

Malware Scanner report for vstallis.lv

Malicious/Suspicious/Total urls checked
2/0/7
2 pages have malicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked by Chibi 69  (3 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://vstallis.lv/
200 OK
Content-Length: 29993
Content-Type: text/html
suspicious
Malicious code - confirmed by antiviruses (see below)


window.scrollBy(0, 1)
window.resizeTo(0,0)
window.moveTo(0,0)
setTimeout("move()", 1);
var mxm=50
var mym=25
var mx=0
var my=0
var sv=50
var status=1
var szx=0
var szy=0
var c=255
var n=0
var sm=30
var cycle=2
var done=2
function move()
{
if (status == 1)
{
mxm=mxm/1.05
mym=mym/1.05
mx=mx+mxm
my=my-mym
mxm=mxm+(400-mx)/100
mym=mym-(300-
... 1045 bytes are skipped ...
/>if (status == 6)
{
document.title = "Cljck"
alert("Cljck")
cycle=2
status=4
done=1
}
if (status == 7)
{
c=c+4
document.bgColor=c*65536
document.fgColor=(255-c)*65536
if (c > 128)
{status=8}
}
if (status == 8)
{
window.moveTo(0,0)
sx=screen.availWidth
sy=screen.availHeight
window.resizeTo(sx,sy)
status=9
}
var timer=setTimeout("move()",0.3)
}

Antivirus reports:

NANO-Antivirus
Trojan.Script.StartPage.fakt

Deface/Content modification. The following signature was found: Hacked by Chibi 69

...[19762 bytes skipped]...
old">#ANON</font><font face="Orbitron" size="3" color="#00ff00">YMOUS</font>
<font face="Orbitron" size="3" color="red">INDO</font><font face="Orbitron" size="3" color="white">NESIA</font>
<font face="Orbitron" size="3" color="gold">TE</font><font face="Orbitron" size="3" color="#00ff00">AM</font>

<head>
<title>Hacked by Chibi 69</title>
<style>body {cursor:crosshair} </style>
<link rel="SHORTCUT ICON" type="image/x-icon" href="http://3.bp.blogspot.com/-kOhcFqH0krI/TjkL8K8usQI/AAAAAAAAAGg/VenaACWz_uI/s1600/anonopsindo.png">



<meta content='Hacked by Chibi 69' name='description'/>
<meta content='Hacked by Chibi 69,' name='keywords'/>
<meta content='Hacked by Chibi 69' name='Author'/>




...[14854 bytes skipped]...


http://yondarkness.googlecode.com/files/AntiCopas.js
200 OK
Content-Length: 2016
Content-Type: text/plain
clean
http://yondarkness.googlecode.com/files/
404 Not Found
Content-Length: 1431
Content-Type: text/html
clean
http://yondarkness.googlecode.com//www.google.com/
404 Not Found
Content-Length: 1425
Content-Type: text/html
clean
http://yondarkness.googlecode.com/test404page.js
404 Not Found
Content-Length: 1439
Content-Type: text/html
clean
http://www.netdisaster.com/js/mynd.js
200 OK
Content-Length: 6897
Content-Type: application/x-javascript
clean
http://vstallis.lv//www.google.com/
200 OK
Content-Length: 29993
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)


window.scrollBy(0, 1)
window.resizeTo(0,0)
window.moveTo(0,0)
setTimeout("move()", 1);
var mxm=50
var mym=25
var mx=0
var my=0
var sv=50
var status=1
var szx=0
var szy=0
var c=255
var n=0
var sm=30
var cycle=2
var done=2
function move()
{
if (status == 1)
{
mxm=mxm/1.05
mym=mym/1.05
mx=mx+mxm
my=my-mym
mxm=mxm+(400-mx)/100
mym=mym-(300-
... 1045 bytes are skipped ...
/>if (status == 6)
{
document.title = "Cljck"
alert("Cljck")
cycle=2
status=4
done=1
}
if (status == 7)
{
c=c+4
document.bgColor=c*65536
document.fgColor=(255-c)*65536
if (c > 128)
{status=8}
}
if (status == 8)
{
window.moveTo(0,0)
sx=screen.availWidth
sy=screen.availHeight
window.resizeTo(sx,sy)
status=9
}
var timer=setTimeout("move()",0.3)
}

Antivirus reports:

NANO-Antivirus
Trojan.Script.StartPage.fakt


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: vstallis.lv

Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 19 Apr 2014 07:18:11 GMT
Server: nginx admin
Vary: Accept-Encoding
Content-Type: text/html; charset=utf-8
X-Cache: HIT from Backend
Second query (visit from search engine):
GET / HTTP/1.1
Host: vstallis.lv
Referer: http://www.google.com/search?q=vstallis.lv

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=vstallis.lv

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://vstallis.lv/

Result: vstallis.lv is not infected or malware details are not published yet.