EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

http://www.berrybenkaofficialjob.com/
Detected Brand
Shopee
Country
International
Confidence
100%
HTTP Status
200
Report ID
10e03de3-e1b…
Analyzed
2026-03-11 21:29
Final URL (after redirects)
http://www.berrybenkaofficialjob.com/m/index

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1A1A29C72C04010AF1936DC93F775BB5AD0C7E72ECE31D41096648F5EAADAEE053624AB
CONTENT ssdeep
192:swUut0MRJ4jSL7chyte4JirHTVOMwYdUKmmMJh7tb2ZStIvqKxf+LVdCrGRVt2zo:vkKfVu+qNGlKwAIhoz7I55Uk

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
e6196666cccccc66
VISUAL aHash
e7e7ffe7e7e7e7e7
VISUAL dHash
cc4d180c4d4d4d45
VISUAL wHash
42c3c3c3e7c3c3c3
VISUAL colorHash
07001030000
VISUAL cropResistant
cc4d180c4d4d4d45,41c1a319cdcd1d39,2f1d7cfc7c7cfcfc

Code Analysis

Risk Score 85/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Banking 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Phishing
• Target: Unknown
• Method: JavaScript form submission
• Exfil: Unknown
• Indicators: Obfuscation detected
• Risk: High

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • document.write
  • unicode_escape
  • base64_strings

📡 API Calls Detected

  • left
  • post
  • GET
  • right
  • POST

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Obfuscation Detected
Use of obfuscated JavaScript functions.
Recent Domain
Domain age is less than 1 year.

🔬 Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
General public
Attack Method
obfuscated JavaScript
Exfiltration Channel
Unknown
Risk Assessment
CRITICAL - Automated credential harvesting with Unknown

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Banking, Personal Info
  • 96 obfuscation techniques

🏢 Brand Impersonation Analysis

Impersonated Brand
Unknown
Fake Service
E-commerce platform

⚔️ Attack Methodology

Primary Method: Phishing via fake login page

The site mimics a legitimate platform to steal user credentials.

Secondary Method: JavaScript form submission

Submits user data to an external server.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
www.berrybenkaofficialjob.com
Registered
2025-03-31
Registrar
Unknown
Status
Active

🤖 AI-Extracted Threat Intelligence

Scan History for www.berrybenkaofficialjob.com

Found 1 other scan for this domain

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.