EN ES PT
Back to Stats

Visual Capture

Screenshot of fnxx.info

Detection Info

https://fnxx.info/c7134438766b12414dpbdd7ebaad251a97bd.html/
Detected Brand
Facebook
Country
International
Confidence
100%
HTTP Status
200
Report ID
250906da-a3c…
Analyzed
2026-03-17 14:40

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1F4C13AB728C03207126F8A945996FB5ED19B069B8AF10F2351D9340DF5A3FF2D98F44A
CONTENT ssdeep
96:TTZCKGvKGRKGoS2MK9KGU9KGtKGBlKGPKGEKG19KG2KGDKGoKGbFb1SLm1KG2KGm:/Zznlqv63tHc5KjqU1SJKHjcOPYkIKrl

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
c343494d65636767
VISUAL aHash
00ff24e7ffffffff
VISUAL dHash
4c20692916000000
VISUAL wHash
00180000cfffffff
VISUAL colorHash
07007000000
VISUAL cropResistant
306868342c000000,121150c948484830

Code Analysis

Risk Score 68/100
Threat Level ALTO
āš ļø Phishing Confirmed
šŸŽ£ Credential Harvester šŸŽ£ Personal Info

šŸ”¬ Threat Analysis Report

• Threat: Phishing
• Target: Facebook Users
• Method: Domain spoofing and potentially malicious code.
• Exfil: Unknown (password likely)
• Indicators: Domain mismatch, obfuscation.
• Risk: High

šŸ”’ Obfuscation Detected

  • fromCharCode

šŸ“Š Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Domain Mismatch
The site uses a domain unrelated to Facebook (fnxx.info) instead of facebook.com.
Impersonation
The site visually impersonates the Facebook login page.
Obfuscation
Obfuscation detected in the code, which hides malicious intent.
Form for sensitive info
The site has a login form asking for sensitive information

šŸ”¬ Comprehensive Threat Analysis

Threat Type
Credential Harvesting Kit
Target
Facebook users (International)
Attack Method
Brand impersonation + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
HIGH - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

āš ļø Indicators of Compromise

  • Kit types: Credential Harvester, Personal Info
  • 4 obfuscation techniques

šŸ¢ Brand Impersonation Analysis

Impersonated Brand
Facebook
Official Website
https://www.facebook.com/
Fake Service
Facebook login

āš”ļø Attack Methodology

Primary Method: Credential Harvesting

The site uses a visually identical login form to trick users into entering their Facebook credentials. These credentials are then captured by the attacker.

Secondary Method: JavaScript Obfuscation

The site utilizes obfuscated Javascript code to hide the malicious actions like credential harvesting, redirection, etc.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
fnxx.info
Registered
Unknown
Registrar
Unknown
Status
Unknown

šŸ¤– AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.