The MD5 sum of one or more binaries hosted on the remote web server matches known malware. This may indicate that the remote site was compromised.
Note that Nessus has only scanned files with the following extensions :
exe , dll , scr , drv , sys , bat , cmd , com , cpl , csh , gadget , application , hta , inf , ins , inx , isu , job , jse , lnk , msc , msi , msp , mst , paf , pif , ps1 , ps1xml , ps2 , ps2xml , psc1 , psc2 , reg , rgs , sct , scf , shb , shs , u3p , vb , vbs , vbe , vbscript , ws , wsf , chm , jar , class , js , jse , swf , pdf , jsp , php , jpeg , jpg , asp , doc , docx , ppt , pptx , xls , xlsx
Binary data www_hosting_malware.nbin