There is also this suspicious file:
/index.html
Severity: Potentially Suspicious
Reason: Detected unconditional redirection to external web resource.
Details: <meta http-equiv="refresh" content="6;URL=htxp://www.fsmphoto.com">
Threat dump: View code
File size[byte]: 2081
File type: ASCII
MD5: 05DC439D88CF3B93EBE5CAE426DCA120
Scan duration[sec]: 0.002000
This is also given as a code hick-up there:
suspicious: maxruntime exceeded 10 seconds (incomplete) 0 bytes
s0.wp dot com/wp-content/js/devicepx-jetpack.js?ver=201346 benign
[nothing detected] (script) s0.wp dot com/wp-content/js/devicepx-jetpack.js?ver=201346
status: (referer=importantpics.com/1950DCPhotos/?tag=suitland-tractor-company)saved 9153 bytes 2e2eeb3b5db8c4955a7786324c70a7c6cb559afd
info: [decodingLevel=0] found JavaScript
error: undefined variable document.body.style
error: line:1: SyntaxError: missing ; before statement:
error: line:1: var document.body.style = 1; (Expected '.')
error: line:1: ....^
suspicious:
The hide-me malcode resides in Decoded Files
30dc/175bb951d094ca784643da8f311db5f89b1d from importantpics dot com/1950DCPhotos/?tag=suitland-tractor-company (20815 bytes, 449 hidden) download
PHP vuln. for site:
http://www.cvedetails.com/vulnerability-list/vendor_id-74/product_id-128/version_id-36749/PHP-PHP-5.1.6.html(local file inclusion exploit)
pol