Malicious defacement detected?

See: https://www.virustotal.com/nl/url/7a24a6f5464bd4d4713f250b56160a6e56b676ef20779ef77b40971710ff0fa1/analysis/#additional-info
See: index.html
Severity: Malicious
Reason: Detected malicious PHP content
Details: Website Potentially Defaced
Included scripts:
-http://tuyulz-blogspot.googlecode.com/files/Anti%20Klik.js
-http://cayunkatel.googlecode.com/files/rainbows.-js
-http://ajax.googleapis.com/ajax/libs/jquery/1.3/jquery.min.js
-http://onehackoranother.com/projects/jquery/jquery-grab-bag/javascripts/jquery.text-effects.js
→ -http://www.domxssscanner.com/scan?url=http%3A%2F%2Fonehackoranother.com%2Fprojects%2Fjquery%2Fjquery-grab-bag%2Fjavascripts%2Fjquery.text-effects.js

Detected vulnerable libraries:
-http://www.mrbrakessandiego.com/
Detected libraries:
jquery - 1.3 : -http://ajax.googleapis.com/ajax/libs/jquery/1.3/jquery.min.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.3.2 : (active1) -http://www.mrbrakessandiego.com/
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
(active) - the library was also found to be active by running code
2 vulnerable libraries detected

Here no specific malware detected: http://zulu.zscaler.com/submission/show/f69b7d3194215f44965729d4dbfe8c9e-1447950387

polonus

Update -
The latest scan gives the Quttera detection.

polonus

html sample from DOM XSS
https://www.virustotal.com/en/file/52190869fc0b694536b1978d0cea14346c01342841c35a96d6ff60f741173a3b/analysis/1447951763/

I miss Avast there…

pol