0 Members and 1 Guest are viewing this topic.
- Reporting a Possible False Positive File or Website - https://www.avast.com/false-positive-file-form.php. You should get a response in a day or two.
Hi animevietsub,Malware as an heuristic generic find was detected on the website, see: https://quttera.com/detailed_report/animevietsub.fanYou find it addressed here: https://quttera.com/detailed_report/animevietsub.fanAlso Avira flags this here: (Avira means Avast also flags) -> https://www.virustotal.com/gui/url/39b1a073d1861b31cdbdc19bfd3573dc72ea4f1b084c907cd1938f56de0229e9?nocache=1and found also to be suspicious after re-analyzing: https://www.virustotal.com/gui/url/39b1a073d1861b31cdbdc19bfd3573dc72ea4f1b084c907cd1938f56de0229e9?nocache=1Suspicious generic find = PS.SuspScript.gen Error: SyntaxError: Unexpected token (eval).JSLint throws up 9 errors - Use double quotes, not single quotes.Detected potentially suspicious initialization of function pointer to JavaScript method eval CcodeE __tmpvar1366573087 = eval; Ccode/EReputation checks have been performed on the IP address for each of the linked sites. Hosts found on blacklists with poor reputation may be a threat to users of the site. Hosting and locations are also included in the results.Read further on this generic detection issue, here: https://stackoverflow.com/questions/34744207/jquery-v2-showing-as-potentially-suspiciousExternally Linked Host Hosting / Company -bit.ly GOOGLE-CLOUD-PLATFORM -www.facebook.com FACEBOOK -www.instagram.com FACEBOOK -fb.com FACEBOOK -www.kanefusafs.net GOOGLE -twitter.com TWITTER -www.youtube.com GOOGLE -bitly.com GOOGLE-CLOUD-PLATFORM See vulners for additional script: https://www.shodan.io/host/103.229.42.224 (link)See: https://urlscan.io/result/589f7a5e-80a8-4816-b661-df60cc0d4e79/Hint scan delivered SECURITY issue:Disallowed HTTP-Headers WarningThe 'Expires' header should not be used, 'Cache-Control' should be preferred.WarningThe 'X-Frame-Options' header should not be used. A similar effect, with more consistent support and stronger checks, can be achieved with the 'Content-Security-Policy' header and 'frame-ancestors' directive.@ https://urlscan.io/responses/bc47e1119a0bab6801b12db9debaefffc2116c5cf8d12cc5e7184154c3ce5d1e/x-frame-options: denyhttps://urlscan.io/favicon.icox-frame-options: denyWait for a final verdict from avast team for this PUP-detection.polonus (volunteer 3rd party cold reconnaissance website security-analyst & website error-hunter)