EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

https://lafoiunrtyui.dynv6.net/FORT/fryob/index.php
Detected Brand
Crédit Agricole
Country
France
Confidence
100%
HTTP Status
N/A
Report ID
209a287b-a9a…
Analyzed
2026-01-14 23:19

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T15562506190A05C3B429393C1B6359B1A37DAC74ACA8B574197F8839A1FF6C64DC0F72E
CONTENT ssdeep
192:tMwwxkMaNkIZI7H1S6QrQHQPEihNytR0xMv0e/xVSYw0L12:tMwJk7H1S6QrQHQPZe0xM8e/fPwO12

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
b333c4d41cced54c
VISUAL aHash
ff0f0f0f0f0fffff
VISUAL dHash
d81b5b5b1b980018
VISUAL wHash
0c0909090f0fffff
VISUAL colorHash
06000000c00
VISUAL cropResistant
d81b5b5b1b980018,a280a02b2b808080,812929326949a541

Code Analysis

Threat Level ALTO

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing targeting banking customers
• Target: Crédit Agricole customers
• Method: Fake login form asking for department code
• Exfil: Unknown (likely designed to capture the input)
• Indicators: Domain mismatch, dynamic DNS, brand impersonation
• Risk: HIGH - immediate data theft

🔐 Credential Harvesting Forms

📤 Form Action Targets

  • ./core/actions/departement.php
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.