Website Vulnerability Scan site hacked, potentially suspicious redirect!

See: https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=www.web-malware-removal.com%2Fwebsite-malware-virus-scanner&ref_sel=GSP2&ua_sel=ff&fs=1

On performing a free scan one is redirected here: hxtps://www.seocoach.at/check/webcheck.php?lang=en&url=ad.nl potentially suspicious: https://quttera.com/detailed_report/www.seocoach.at

/wp-content/themes/enfold/config-layerslider/LayerSlider/static/layerslider/js/layerslider.kreaturamedia.jquery.js?ver=6.5.1 Severity: Potentially Suspicious Reason: Detected procedure that is commonly used in suspicious activity. Details: Too low entropy detected in string [['1o.2C={7l:{aa:!1,cP:!1},fc:"6B"!=2u jz%26%26jz,cK:[],aq:[],8C:[],3l:{},eN:{},cC:2A.cC,eL:5x(\'8d[27*="5v']] of length 94995 which may point to obfuscation or shellcode. error in script - detected] script info: [decodingLevel=0] found JavaScript error: line:3: SyntaxError: unterminated string literal: error: line:3: [c])p=p.replace(newRegExp('\\b'+e(c)+'\\b','g'),k[c]);returnp}('1o.2C={7l:{aa:!1,cP:!1},fc:"6B"!=2ujz%26%26jz,cK:[],aq:[],8C:[],3l:{},eN:{},cC:2A.cC,eL:5x(\'8d[27*="5v.eC.cA.js"]\')[0],cj:"",7N:!1,g8:19(e,t,i,s){1da,o,r="]] error: line:3: ...............................................................^

polonus (volunteer website security analyst and website error-hunter)

The error in this jQuery layerslider javascript, mentioned in the posting above,
is a so-called “unterminated string literal error”, which can be a real nasty with included scripts.
(info credits: StackOverflow’s voY).

More to look into: http://retire.insecurity.today/#!/scan/3ada81e828873292e8956f070071930e2221b90c5c5e9c607f4591e0d1281ba3
The detected retirable code found JavaScript, suspicious: maxruntime exceeded 10 seconds.

pol