EN ES PT
Back to Stats

Visual Capture

Screenshot of www.coinbaseaai.com

Detection Info

https://www.coinbaseaai.com
Detected Brand
Coinbase
Country
USA
Confidence
100%
HTTP Status
200
Report ID
3b25843e-6d4โ€ฆ
Analyzed
2026-03-14 01:35
Final URL (after redirects)
https://www.coinbaseaai.com/#/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T19CE2CB65A20151A302B3CEC7D6717F3E729BF30F85069780BAAA61941FFBC76B5214B4
CONTENT ssdeep
192:6NsR1CfDDqFPDVjF+dCWPp4iT7M+Su+GQsTeGRpg8WbD3RUNuNTjg6gf/Vi7hpga:SII4iT7MySNREE7

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
cc98994ee6663366
VISUAL aHash
18181810381818ff
VISUAL dHash
32b232a02022a2a2
VISUAL wHash
383c18383c3c3cff
VISUAL colorHash
380000001c0
VISUAL cropResistant
32b232a02022a2a2

Code Analysis

Risk Score 100/100
Threat Level ALTO
โš ๏ธ Phishing Confirmed
๐ŸŽฃ Credential Harvester ๐ŸŽฃ OTP Stealer ๐ŸŽฃ Card Stealer ๐ŸŽฃ Banking ๐ŸŽฃ Personal Info
WebSocket C2

๐Ÿ”ฌ Threat Analysis Report

โ€ข Threat: Impersonation
โ€ข Target: Coinbase users
โ€ข Method: Domain spoofing and visual mimicry
โ€ข Exfil: Unknown (potentially through intercepted WebSocket traffic)
โ€ข Indicators: Domain mismatch, brand impersonation, JavaScript obfuscation
โ€ข Risk: High

๐Ÿ”’ Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • unicode_escape
  • base64_strings

๐ŸŽฏ Kit Endpoints

  • /platform/logo_72.png?3.0.1768770840912
  • /platform/logo_120.png?3.0.1768770840912
  • /platform/logo_144.png?3.0.1768770840912
  • /platform/logo_57.png?3.0.1768770840912

๐Ÿ“ก API Calls Detected

  • post
  • POST

๐Ÿ“Š Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Domain Impersonation
The domain name closely resembles the legitimate brand, increasing the likelihood of users being tricked.
JavaScript Obfuscation
Obfuscation is used, meaning there is hidden potentially malicious code that is designed to avoid being easily analyzed. The atob, eval, and fromCharCode functions are frequently used in malicious JS code.
Brand Impersonation
The site visually mimics the Coinbase interface, aiming to deceive users into believing it's legitimate.

๐Ÿ”ฌ Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
Coinbase users (USA)
Attack Method
Brand impersonation + real-time WebSocket exfiltration + obfuscated JavaScript
Exfiltration Channel
WebSocket (3 endpoints)
Risk Assessment
CRITICAL - Automated credential harvesting with WebSocket (3 endpoints)

โš ๏ธ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Card Stealer, Banking, Personal Info
  • 298 obfuscation techniques

๐Ÿข Brand Impersonation Analysis

Impersonated Brand
Coinbase
Official Website
https://www.coinbase.com
Fake Service
Coinbase cryptocurrency trading/platform

โš”๏ธ Attack Methodology

Primary Method: Credential Harvesting

The site attempts to phish for credentials by imitating the Coinbase website/app. Users may be prompted to enter their login details or other sensitive information.

Secondary Method: Malicious Script Execution

Obfuscated Javascript might be used to monitor user actions, scrape data, or redirect to further phishing sites. WebSocket usage suggests the potential of live data streaming for exfiltration.

๐ŸŒ Infrastructure Indicators of Compromise

Domain Information

Domain
coinbaseaai.com
Registered
2023-01-08
Registrar
Namecheap
Status
active

๐Ÿค– AI-Extracted Threat Intelligence

Similar Websites

Pages with identical visual appearance (based on perceptual hash)

๐Ÿ˜ฐ
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.