Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: wmzby.ru
Result:
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: close
Date: Sat, 07 Mar 2015 09:22:24 GMT
Pragma: no-cache
Server: nginx
Content-Type: text/html; charset=utf-8
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: 6cc4fe850e0dcabf5cad75f0090344f7=rvjdbedpgd1k6obdgar68n6cp3; path=/; HttpOnly
X-Powered-By: PHP/5.4.35
GET / HTTP/1.1
Host: wmzby.ru
Result:
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: close
Date: Sat, 07 Mar 2015 09:22:24 GMT
Pragma: no-cache
Server: nginx
Content-Type: text/html; charset=utf-8
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: 6cc4fe850e0dcabf5cad75f0090344f7=rvjdbedpgd1k6obdgar68n6cp3; path=/; HttpOnly
X-Powered-By: PHP/5.4.35
Second query (visit from search engine):
GET / HTTP/1.1
Host: wmzby.ru
Referer: http://www.google.com/search?q=wmzby.ru
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: wmzby.ru
Referer: http://www.google.com/search?q=wmzby.ru
Result:
The result is similar to the first query. There are no suspicious redirects found.
Scanned pages/files
Request | Server response | Status |
http://wmzby.ru/ | 200 OK Content-Length: 44044 Content-Type: text/html | clean |
http://wmzby.ru/media/system/js/mootools-core.js | 200 OK Content-Length: 83893 Content-Type: application/javascript | clean |
http://wmzby.ru/media/system/js/core.js | 200 OK Content-Length: 3813 Content-Type: application/javascript | clean |
http://wmzby.ru/media/system/js/caption.js | 200 OK Content-Length: 729 Content-Type: application/javascript | clean |
http://wmzby.ru/media/system/js/mootools-more.js | 200 OK Content-Length: 236825 Content-Type: application/javascript | clean |
http://wmzby.ru/plugins/system/rokbox/rokbox.js | 200 OK Content-Length: 48156 Content-Type: application/javascript | clean |
http://wmzby.ru/plugins/system/rokbox/themes/clean/rokbox-config.js | 200 OK Content-Length: 2598 Content-Type: application/javascript | clean |
http://wmzby.ru/templates/rt_fracture/js/gantry-totop.js | 200 OK Content-Length: 527 Content-Type: application/javascript | clean |
http://wmzby.ru/libraries/gantry/js/browser-engines.js | 200 OK Content-Length: 1186 Content-Type: application/javascript | clean |
http://wmzby.ru/templates/rt_fracture/js/load-transition.js | 200 OK Content-Length: 749 Content-Type: application/javascript | clean |
http://wmzby.ru/modules/mod_roknavmenu/themes/fusion/js/fusion.js | 200 OK Content-Length: 26433 Content-Type: application/javascript | clean |
http://wmzby.ru/components/com_roksprocket/assets/js/mootools-mobile.js | 200 OK Content-Length: 4420 Content-Type: application/javascript | clean |
http://wmzby.ru/components/com_roksprocket/assets/js/rokmediaqueries.js | 200 OK Content-Length: 2935 Content-Type: application/javascript | clean |
http://wmzby.ru/components/com_roksprocket/assets/js/roksprocket.js | 200 OK Content-Length: 1163 Content-Type: application/javascript | clean |
http://wmzby.ru/components/com_roksprocket/assets/js/moofx.js | 200 OK Content-Length: 25140 Content-Type: application/javascript | clean |
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=wmzby.ru
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://wmzby.ru/
Result: wmzby.ru is not infected or malware details are not published yet.
Result: wmzby.ru is not infected or malware details are not published yet.