EN ES PT
Back to Stats

Visual Capture

Screenshot of m.hf839.com

Detection Info

http://m.hf839.com
Detected Brand
Atletico Madrid / Various gambling websites
Country
International
Confidence
100%
HTTP Status
200
Report ID
00e800d2-9b0…
Analyzed
2026-03-17 01:52
Final URL (after redirects)
http://m.hf839.com/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1C672B932003DEA6B0AA252E5FEE45BDEE75A51DCCF630F2192E4879D8EC5D78CC11089
CONTENT ssdeep
384:4wGL9fhC9fYOp/4GkHDbUD2XrgJ8PSQhJbaPLxfF66:mzSp/DSrcIhJWj66

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
92699a32398ecf33
VISUAL aHash
7c04383c003c3c3c
VISUAL dHash
68d870708dede869
VISUAL wHash
ff2c3c3c043c3c3c
VISUAL colorHash
382000080c1
VISUAL cropResistant
3231b5b9d9c9c8c8,e8e06c531b1c2c2c,565c64545463cbd5,8ba9afdbd04c3e9a,68d870708dede869

Code Analysis

Risk Score 97/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Phishing
• Target: Atletico Madrid fans, gamblers
• Method: Impersonation and enticing promotions
• Exfil: Unknown (JS obfuscation hints at data theft)
• Indicators: Domain mismatch, Javascript obfuscation, gambling content
• Risk: High

🔒 Obfuscation Detected

  • eval
  • fromCharCode
  • unescape
  • document.write
  • hex_escape
  • unicode_escape

📡 API Calls Detected

  • get
  • post

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Domain Mismatch
The domain does not belong to the brand being impersonated.
Obfuscated Javascript
Indicates malicious intent and data exfiltration.
Gambling Promotion
Common tactic to lure people into financial risk.
Recent Domain Age
New domains are often used for phishing campaigns.

🔬 Comprehensive Threat Analysis

Threat Type
Two-Factor Authentication Stealer
Target
Atletico Madrid / Various gambling websites users (International)
Attack Method
Brand impersonation + credential harvesting forms + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
CRITICAL - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Personal Info
  • 101 obfuscation techniques

🏢 Brand Impersonation Analysis

Impersonated Brand
Atletico Madrid, AG Gaming
Fake Service
Gambling Site

Fraudulent Claims

⚔️ Attack Methodology

Primary Method: Impersonation (Brand: Atletico Madrid, AG Gaming, Gambling)

The site uses logos and branding of Atletico Madrid and AG gaming to lure users. The domain does not align with either brand, signaling phishing.

Secondary Method: Obfuscation

Javascript is obfuscated to hide malicious functionality.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
m.hf839.com
Registered
2023-09-19
Registrar
N/A
Status
ACTIVE

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.