Abuse Message [AbuseID:9A4610:0F]: AbuseNormalInfo: [clean-mx-viruses-174631085](176.9.247.226)—>(abuse@hetzner.de) viruses sites (1 so far) within your network, please close them! status: As of 2021-12-13 11:57:56 CET

 please have a look on these perhaps offending viruses sites(1) so far.

 Notice: We do NOT urge you to shutdown your customer, but to inform him about a possible infection/misbehavior !

 status: As of 2021-12-13 11:57:56 CET

 Please preserve on any reply our Subject: [clean-mx-viruses-174631085](176.9.247.226)—>(abuse@hetzner.de) viruses sites (1 so far) within your network, please close them! status: As of 2021-12-13 11:57:56 CET


http://support.clean-mx.de/clean-mx/viruses.php?email=abuse@hetzner.de&response=alive

 (for full uri, please scroll to the right end …

 This information has been generated out of our comprehensive real time database, tracking worldwide viruses URI’s

 If your review this list of offending site(s), please do this carefully, pay attention for redirects also!
 Also, please consider this particular machines may have a root kit installed !
 So simply deleting some files or dirs or disabling cgi may not really solve the issue !

 Advice: The appearance of a Virus Site on a server means that
 someone intruded into the system. The server’s owner should
 disconnect and not return the system into service until an
 audit is performed to ensure no data was lost, that all OS and
 internet software is up to date with the latest security fixes,
 and that any backdoors and other exploits left by the intruders
 are closed. Logs should be preserved and analyzed and, perhaps,
 the appropriate law enforcement agencies notified.

 DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITY
 PROBLEM, THEY WILL BE BACK!

 You may forward my information to law enforcement, CERTs,
 other responsible admins, or similar agencies.

 +————————————————————————————————

 |date |id |virusname |ip |domain |Url|
 +————————————————————————————————
 |2021-12-13 07:32:05 CET |174631085 |Trojan/Win.Generic.C4573553 |176.9.247.226 |uploadgram.me |https://dl.uploadgram.me/61b4bfa61bcd4h?raw
 +————————————————————————————————


 Your email address has been pulled out of whois concerning this offending network block(s).
 If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available…


 If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed case

 explanation of virusnames:
 ==========================
 unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injection
 unknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injection
 unknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evals
 unknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injection
 unknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positive
 …javascript.insert Please pay attention for script code after </html>
 unknown_exe not yet detected by scanners as malware, but high risk!
 all other names malwarename detected by scanners
 ==========================


 yours

 Gerhard W. Recher
 (CTO)

 net4sec UG (haftungsbeschraenkt)

 Leitenweg 6
 D-86929 Penzing

 GSM: ++49 171 4802507

 Geschaeftsfuehrer: Martina Recher
 Handelsregister Augsburg: HRB 27139
 EG-Identnr: DE283762194

 w3: http://www.clean-mx.de
 e-Mail: mailto:abuse@clean-mx.de
 PGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552
 Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc