See: http://urlquery.net/report.php?id=6285284 and an earlier detection: http://urlquery.net/report.php?id=5168206
See flagged here: https://www.virustotal.com/nl/url/512a637dbe2e0371948b439990cb75a75acaa3ddb0fac5ae6a3ec253a423fd71/analysis/1380826373/
This scanner detects malcode: http://sitecheck.sucuri.net/results/www.clubmedmall.com
I gave in the post topic, because of this: http://jsunpack.jeek.org/?report=d42372a2cc19226c29f1fd1615727353bbdc0ff3
(for security researchers only, use with NoScript extension active and in a VM)
I get there: An appropriate representation of the requested resource /embed_patch.js could not be found on this server.
We have detection because avast! Web Shield detects this embed_patch.js as infected with
JS:Decode-BFQ[Trj] as I checked to get it via the malzilla malcode browser.
Yes, my dear avast user friends, keep these avast! Shields up, active and running!
You now know why this is ;D
polonus