Hi malware fighters.
http://unmaskparasites.com/web-page-options/?url=http%3A//www.51718.cn/sale.asp&susp=1&sb=1
Drive-By Downloads (what’s this?)
External link: * link - htxp://32f.office.1s.fr/office.js?google_ad_format=728x90_as
It infected 1026 domains, including itnb.net/, jnvc.cn/, 51718.cn/.
Threats found: 46
Here is a sample: (for more information about a specific threat, click on the Threat Name below)
Threat Name: HTTP Malicious Iframe Image Request
Location: htxp://www.51718.cn/Product.asp?BigClassName=%C3%8E%C3%82%C2%B6%C3%88%C3%92%C3%87%C2%B1%C3%AD
Threat Name: HTTP Malicious Iframe Image Request
Location: htxp://www.51718.cn/sale.asp
Threat Name: HTTP Malicious Iframe Image Request
Location: htxp://www.51718.cn/ArticleShow.asp?ArticleID=792
Threat Name: HTTP Malicious Iframe Image Request
Location: htxp://www.51718.cn/ArticleShow.asp?ArticleID=412
Threat Name: HTTP Malicious Iframe Image Request
Location: htxp://www.51718.cn/ArticleShow.asp?ArticleID=398
Direct link to: htxp://www.51718.cn/principle.asp
Location: htxp://www.51718.cn/Product.asp?BigClassName=&SmallClassName=
Direct link to: htxp://www.51718.cn/culture.asp
Location: hxtp://www.51718.cn/product.asp
Direct link to: htxp://www.51718.cn/Product.asp?BigClassName=&SmallClassName=
Location: htxp://www.51718.cn/Product.asp?BigClassName=&SmallClassName=&page=4
Direct link to: htxp://www.51718.cn/Search.asp?Field=&Keyword=&BigClassName=&SmallClassName=&page=63
Location: htxp://www.51718.cn/Search.asp?Field=&Keyword=&BigClassName=&SmallClassName=&page=62
Direct link to: htxp://www.51718.cn/Principle.asp
Location: htxp://www.51718.cn/culture.asp
polonus