Abuse on website...unknown_html_RFI_php malware!

See: http://www.abuseipdb.com/report-history/192.163.192.224
Flagged: https://www.virustotal.com/nl/url/4e4fcaa1d268a4cce12dfe994a57112f9452adfec365470e8ee644c87a28e8ef/analysis/1431963027/
Outdated Web Server Apache Found Vulnerabilities on Apache 2.2 Apache/2.2.24
See: https://malwr.com/analysis/MTkwZTNmNDRlNWU4NDVlZDllNzY1NWQ0NWE1NjQ3OTk/
Excessive header info proliferation: Server: Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4
X-Powered-By: PHP/5.3.25
IP Address: 192.163.192.224
Provider: Unified Layer
Country: United States

Theme name: office
Wordpress Version 4.1 based on: http://con.abcgroup.com.bd/wp-includes/js/autosave.js
vulnerable to SEO redirect exploit.
Vulnerabilities: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fcon.abcgroup.com.bd
Critical in version: https://codex.wordpress.org/Version_4.1.5

polonus