Detected - FILE_25536075.doc VT-> 75514f8a313510c6ac38b4519c8e4720f8d55a6003fe8dbcde5fac3178b30f20
See: https://urlhaus.abuse.ch/url/420644/ → https://urlhaus.abuse.ch/browse.php?search=75514f8a313510c6ac38b4519c8e4720f8d55a6003fe8dbcde5fac3178b30f20
Nothing flagged here: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=I3x2WyNzZ317e24ubnt0~enc
Site issue not found: https://sitecheck.sucuri.net/results/davidsgreen.net
No Word Press CMS alerts.
Next to the malware opens up to -https://en.aoebbs.cn/static/js/common.js?aCW *
Number of sources found: 66
Number of sinks found: 60
&
Results from scanning URL: -https://en.aoebbs.cn/home.php?mod=misc&ac=sendmail&rand=1595940265
Number of sources found: 32
Number of sinks found: 35
JS errors in *
[“Not JSON”,{}]
chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/userscript.html?name=JSON%2520formatter.user.js&id=e5f12c29-d603-44a5-8840-ce0b54122d95:277 loadJSON()
chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/userscript.html?name=JSON%2520formatter.user.js&id=e5f12c29-d603-44a5-8840-ce0b54122d95:303 formatJSON()
chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/userscript.html?name=JSON%2520formatter.user.js&id=e5f12c29-d603-44a5-8840-ce0b54122d95:49 eval()[“Not JSONP”,{}]
chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/userscript.html?name=JSON%2520formatter.user.js&id=e5f12c29-d603-44a5-8840-ce0b54122d95:296 loadJSON()
chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/userscript.html?name=JSON%2520formatter.user.js&id=e5f12c29-d603-44a5-8840-ce0b54122d95:303 formatJSON()
chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/userscript.html?name=JSON%2520formatter.user.js&id=e5f12c29-d603-44a5-8840-ce0b54122d95:49 eval()ERROR: Execution of script ‘Dat Peer Detector v 1.1’ failed! require is not defined
chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/userscript.html?name=Dat%2520Peer%2520Detector%2520v%25201.1.user.js&id=8385c705-e043-490a-99d4-4d0e8f6b7f45:1 eval()
chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/userscript.html?name=Dat%2520Peer%2520Detector%2520v%25201.1.user.js&id=8385c705-e043-490a-99d4-4d0e8f6b7f45:1 eval()
chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/userscript.html?name=Dat%2520Peer%2520Detector%2520v%25201.1.user.js&id=8385c705-e043-490a-99d4-4d0e8f6b7f45:161 eval()SyntaxError: Invalid regular expression flags
eval ()()
:3:98()
Object.c [as F_c] (:2:146)()
Object.E_u (:3:267)()
la (eval at exec_fn (:1:147), :60:53)()
Object.create (eval at exec_fn (:1:147), :71:325)()
d (eval at exec_fn (:1:147), :13:89)()
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)