Avast detects as JS:Iframe-ALS [Trj]

See: http://zulu.zscaler.com/submission/show/21287982aece409abde6ba5e6ee26d78-1366490309
and https://www.virustotal.com/en/url/079e6546536eeb25e2514b36bac3eb2fd591a3323f908709bf6a63a03640c73b/analysis/
Malware found: http://sitecheck.sucuri.net/results/rakhe.com
http://labs.sucuri.net/db/malware/mwjs-iframe-injected691?v3
See: http://urlquery.net/report.php?id=2094382 and http://quttera.com/detailed_report/rakhe.com
or
http://safebrowsing.clients.google.com/safebrowsing/diagnostic?site=rakhe.com

polonus

Actually flagged here during recent seven days: http://www.avgthreatlabs.com/sitereports/domain/rakhe.com
amd here: http://checkwebsitesafe.net/www/rakhe.com

polonus

See detection and malcode here: http://evuln.com/tools/malware-scanner/rakhe.com/
and 4 suspicious files here: http://quttera.com/detailed_report/rakhe.com → Detected hidden iframe tag to ‘info dot thebeachfrontclub dot com’
with a not found launching Redkit exploit via iFrame: http://urlquery.net/report.php?id=2087788 (same IP)

polonus

Scan of the sucuri code: https://www.virustotal.com/en-gb/file/4cbf7b88069ec0c01e5f3068cf9b9aca8f4c4d7607cdc6a2f06e900e6b642bfe/analysis/1366542307/
(credits go to Pondus - thanks)
And we see that avast! neatly detects this as infested as JS:Iframe-AML [Trj]

polonus

Re-checked and now given clean: http://urlquery.net/report.php?id=3177766
&
http://zulu.zscaler.com/submission/show/21287982aece409abde6ba5e6ee26d78-1371484496

polonus