file.phpbackdoor detected on this website?

See: https://www.virustotal.com/nl/url/272f51af8d6196fd4d638462257d3fe37a85b03b408179b3484d2d5dbe09a725/analysis/1443451938/
Unable to properly scan site: https://sitecheck.sucuri.net/results/for-life.spb.ru
Checking for cloaking
There is a difference of 120 bytes between the version of the page you serve to Chrome and the version you serve to GoogleBot. This probably means some code is running on your site that’s trying to hide from browsers but make Google think there’s something else on the page.
Status codes
These should normally all be the same.

Google Chrome returned code 200
GoogleBot returned code 404

Website status risk: 7 red out of 10: http://toolbar.netcraft.com/site_report/?url=http%3A%2F%2Ffor-life.spb.ru

I get HTTP/1.1 502 Bad Gateway
Server: nginx/1.6.2
Date: Mon, 28 Sep 2015 14:58:45 GMT
Content-Type: text/html
Content-Length: 2660
Connection: close
ETag: “5435430c-a64” → http://toolbar.netcraft.com/site_report?url=http://std-carp0-http.nic.ru
http://whois.domaintools.com/for-life.spb.ru domain name does not resolve.

Admission to specified URL closed:

Доступ по указанному URL закрыт
Пожалуйста, укажите правильный URL необходимого Вам сайта.

Круглосуточная техническая поддержка хостинга:
blurred info
Эл. почта: support@nic.ru

polonus (volunteer website security analyst and website error-hunter)

read here how evil a threat identified as: CYSC.FILE.MALWARE.PHPBACKDOOR-5
can be: http://blog.malwaremustdie.org/2012/10/how-far-phpc99shell-malware-can-go-from.html
About the incident: https://www.c-sirt.org/en/incident/272f51af8d6196fd4d638462257d3fe37a85b03b408179b3484d2d5dbe09a725
Also reported here: https://defense.ballastsecurity.net/decoding/?raw

polonus