EN ES PT
Back to Stats

Visual Capture

Screenshot of www.easybank-landing-page-design.vercel.app

Detection Info

http://www.easybank-landing-page-design.vercel.app/
Detected Brand
Easybank
Country
International
Confidence
95%
HTTP Status
200
Report ID
34a6168e-ff7…
Analyzed
2026-03-13 11:30
Final URL (after redirects)
https://easybank-landing-page-design.vercel.app/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1CBF1F11996D5B933838331D5F66BE34BF3A08202D8631F129AF9C3984FE6D49DD13859
CONTENT ssdeep
96:TxFwHSJSJSNEUl4EUzZEU1LEU1eZ5ZooJnbocg0uVsO8O0cg1KWlM/5OTzqI:3H443lKzT151IxbC8ONu1KzImI

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
ca49adb6d293aaa2
VISUAL aHash
f8f8f8fcfcffffff
VISUAL dHash
815351c8c4654a1a
VISUAL wHash
f8383878fc3c9383
VISUAL colorHash
07002000c00
VISUAL cropResistant
815351c8c4654a1a,b236a6a7a76b6671,b28e8cb2aa82b2aa,28594bcf4b4b09c0

Code Analysis

Risk Score 53/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester

🔬 Threat Analysis Report

• Threat: Phishing
• Target: Easybank users
• Method: Impersonation via fake website
• Exfil: Potentially credential harvesting, based on forms.
• Indicators: Free hosting, brand logo
• Risk: HIGH

🔒 Obfuscation Detected

  • fromCharCode

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Free Hosting
The site is hosted on a free hosting provider, commonly used for phishing.
Brand Impersonation
The site mimics the appearance of a legitimate banking service.
Obfuscation Detected
Code obfuscation is a common tactic to evade detection and analysis

🔬 Comprehensive Threat Analysis

Threat Type
Credential Harvesting Kit
Target
Easybank users (International)
Attack Method
Brand impersonation + credential harvesting forms + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
MEDIUM - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester
  • 2 obfuscation techniques

🏢 Brand Impersonation Analysis

Impersonated Brand
Easybank
Fake Service
Banking

⚔️ Attack Methodology

Primary Method: Credential Harvesting

The attacker aims to steal user credentials by mimicking the legitimate Easybank website. Users are tricked into entering their login details on the fake site.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
easybank-landing-page-design.vercel.app
Registered
None
Registrar
None
Status
Active

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.