No alerts here: http://urlquery.net/report.php?id=1116928
Thrice blacklisted here: http://www.urlvoid.com/scan/zsb05.com/
Well it is being detected by avast as JS:Agent-AOH [Trj], see: https://www.virustotal.com/ru/file/30d557e7de43f5c5bfd30fcc086b601203354db4b58220c5acc4e5f5cceb0e6d/analysis/
{“sha256”: “06bb6df576dd34983fbf731605adadd5e3f3eccfffb0be1a992d774ccc0358ce”, “result”: 1, “last_analysis_url”: “/en/url/06bb6df576dd34983fbf731605adadd5e3f3eccfffb0be1a992d774ccc0358ce/analysis/”, “timestamp”: 1361711379, “positives”: 4, “last_analysis_date”: “2013-02-24 13:09:39”, “total”: 34, “url_exists”: true, “reanalyse_url”: “/en/url/submission/?force=1&url=htxp://zsb05.com/”}
Also the avast! Web Shield detects and blocks connection to JS:Agent-AOH [Trj]
Risky URLs found in: htxp://zsb05.com/
1: htxp://web.nba1001.net:8888/tj/tongji.js → https://www.virustotal.com/en/url/802c247f8749f6a208f1a247dcb9ca3b28f8dfec881fb91e49a1f5e8645f7aa6/analysis/ found at line 1176 Note: The script call above is loading content from a flagged site and should be removed… credits go again to redleg’s fileviewer analysis
In one particular case the infection to the website came from an infected flash drive owned by the site’s web master- a USB auto infect virus that binded its self on to almost all the exe files - so web masters watch your USB sticks…(reported by Brian Vest on technibble forums)
polonus