polonus
January 11, 2015, 11:17pm
1
See: http://killmalware.com/cqpos.net/#
Warnings: https://asafaweb.com/Scan?Url=cqpos.net
http://quttera.com/detailed_report/cqpos.net#collapseEight
List of referenced blacklisted domains/hosts: 69
Javascript included from a blacklisted domain. Details: http://sucuri.net/malware/entry/MW:BLK:2
Javascript: -js.17meiliba.com
external link malicious: htxp://js.users.51.la/17468139.js
Trojans detected:
Object: http://k.sdtsm.com/1421018280/guodou_105_6337.exe
SHA1: a0f24a5de750e183add80b80b618dd5b06997da4
Name: Application.Win32.ShouQu.B avast detects as Win32:Malware-gen
Malware Code. Found by Comodo Cloud checking. Re: http://hashtool.eshigee.eu/hashes/cQpos<ó
polonus
polonus
January 12, 2015, 12:06am
2
Update, consider: https://urlquery.net/report.php?id=1425949549393
and http://killmalware.com//
Hidden/Malicious iFrames - Code: 0,
Content cannot be read! → links to: http://go.microsoft.com/fwlink/?linkid=8180
page has been removed: htxp://kojbhbf.com.iplanetwork.com/en/502.shtml
This blocked by Google Safebrowsing p-> htxp://kojbhbf.com/Resource/
Response body:
<html><head><title>Error</title></head><body>ϵͳ�Ҳ���ָ�����ļ���
</body></html>
Malicious link detected: Results from scanning URL: htxp://js.users.51.la/17434654.js
Number of sources found: 11
Number of sinks found: 3
Two warnings here: https://asafaweb.com/Scan?Url=kojbhbf.com%2FResource
polonus