Scanned pages/files
Request | Server response | Status |
http://werehamster.com/ | 200 OK Content-Length: 3149 Content-Type: text/html | clean |
http://werehamster.com/.wysiwygPro_preview_eacf331f0ffc35d4b482f1d15a887d3b.php | 200 OK Content-Length: 13 Content-Type: text/html | clean |
http://werehamster.com/test404page.js | 404 Not Found Content-Length: 2445 Content-Type: text/html | clean |
http://cdn.dsultra.com/js/registrar.js | 200 OK Content-Length: 1688 Content-Type: application/x-javascript | clean |
http://werehamster.com/1.exe | 200 OK Content-Length: 300959 Content-Type: application/octet-stream | clean |
http://werehamster.com/404.shtml | 200 OK Content-Length: 2445 Content-Type: text/html | clean |
http://werehamster.com/500.shtml | 200 OK Content-Length: 94 Content-Type: text/html | clean |
http://werehamster.com/IMG_0198.MOV | 200 OK Content-Length: 302417 Content-Type: video/quicktime | clean |
http://werehamster.com/LFA-PC30US-40353.exe | 200 OK Content-Length: 302159 Content-Type: application/octet-stream | clean |
http://werehamster.com/LICENSE | 200 OK Content-Length: 15398 Content-Type: text/plain | clean |
http://werehamster.com/about.php | 200 OK Content-Length: 5101 Content-Type: text/html | suspicious |
Hidden iFrame found. size: 0x0 src: http://www.youtube.com/embed/ewt0j3q4cyy?autoplay=1&loop=1 <iframe width="0" height="0" src="http://www.youtube.com/embed/ewt0j3q4cyy?autoplay=1&loop=1" frameborder="0"> Deface/Content modification. The following signature was found: HaCked by x.An0nPH ...[405 bytes skipped]... ous #OccupyPhilippines, Anonymous Butuan, PrivateX, #pR.ison3r"/> <style type="text/css">body, a:hover {cursor: url(http://cur.cursors-4u.net/cursors/cur-11/cur1054.cur), url(http://cur.cursors-4u.net/cursors/cur-9/cur862.png), progress !important;}</style> <link rel="SHORTCUT ICON" href="http://imageshack.us/a/img716/272/philippineflagsourcec0d.gif" type="image"> <title>HaCked by x.An0nPH</title> <script>alert("~Security Breach !")</script> <script>alert("~ xAn0nPH was H3r3 !")</script> <script>alert("We're about to Exploit your Security")</script> <style type="text/css"> body { background-image:url('http://www.nurvsoft.com/images/backgroud.jpg'); background-color: #000000; background-repeat:no-repeat; ...[5036 bytes skipped]... | ||
http://werehamster.com/access.php | 200 OK Content-Length: 317 Content-Type: text/html | clean |
http://werehamster.com/acousticidol/ | 200 OK Content-Length: 88 Content-Type: text/html | clean |
http://werehamster.com/acousticlive/ | 200 OK Content-Length: 288 Content-Type: text/html | clean |
http://werehamster.com/admin.php | 200 OK Content-Length: 703 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: werehamster.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 09 May 2015 22:44:21 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 3149
Content-Type: text/html;charset=ISO-8859-1
...3149 bytes of data.
GET / HTTP/1.1
Host: werehamster.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 09 May 2015 22:44:21 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 3149
Content-Type: text/html;charset=ISO-8859-1
...3149 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: werehamster.com
Referer: http://www.google.com/search?q=werehamster.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: werehamster.com
Referer: http://www.google.com/search?q=werehamster.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=werehamster.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://werehamster.com/
Result: werehamster.com is not infected or malware details are not published yet.
Result: werehamster.com is not infected or malware details are not published yet.