Author Topic: HTML/Infected.WebPage.Gen2 not detected on site...  (Read 2324 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
HTML/Infected.WebPage.Gen2 not detected on site...
« on: January 11, 2012, 06:58:26 PM »
See: http://vscan.urlvoid.com/analysis/377105b0cec44ab66a56e9509ceb9518/MDI4LWh0bWw=/
See: http://www.virustotal.com/file-scan/report.html?id=9ffee7e7fe85b4c77e377494d68528561d9b6031490bee735980fa925a667c3c-1326237506
Avast should detect:  HTML:Iframe-inf
See: http://urlquery.net/queued.php?id=15701
-ajax.googleapis.com/ajax/libs/jqueryui/1.7.2/jquery-ui.min.js suspicious
[suspicious:2] (ipaddr:72.14.204.95) (script) -ajax.googleapis.com/ajax/libs/jqueryui/1.7.2/jquery-ui.min.js
     status: (referer=mck.skoczow.pl/)saved 186181 bytes f978dcb9ea6ecfbc7f8a2f9948bacd679c0cd1b4
     info: [iframe] -ajax.googleapis.com/ajax/libs/jqueryui/1.7.2/javascript:false;
     info: [decodingLevel=0] found JavaScript
     error: undefined variable jQuery
     error: undefined variable c.fn
     error: line:1: SyntaxError: missing ; before statement:
          error: line:1: var c.fn = 1;
          error: line:1: ....^
     suspicious:
redirect doorway to: -http://toksikoza.net/in.cgi?5
malware list collected over cz zone: Status 404  e.g. donut-virus site

polonus

Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

razoreqx

  • Guest
« Last Edit: January 11, 2012, 08:12:55 PM by razoreqx »

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
Re: HTML/Infected.WebPage.Gen2 not detected on site...
« Reply #2 on: January 11, 2012, 11:44:09 PM »
Hi razoreqx,

If giving a link there, I would like to see it broken, because there is live malware out there in this case up and infectious. The innocent and not so security savvy visitors could easily get themselves infected by not using the precautions we do and click a wrong link. That is why I present these finds rather via VT or other scan results, and give parts of suspicious code in jsunpack without giving direct page links. Even taking these direct precautions when doing cold reconnaisance needs browser protection of some sort, that is ample script blocking (noscript or NotScripts and running the browser in a sandbox or VM). Users do not know that skimming through malware source code even via a proxy in the browser can get them infected without their av solution detecting (always scan your browser files in the aftermath), so give suspicious links always like -wwww etc. Live malware code always to be presented as an image to avoid unnessary alerts and other risks. To view code use jsunpack with ample script protection or the malzilla browser sandboxed. So the analyst also should introduce SafeHex! And remember the malcreant is also an avast forum visitor....

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!