EN ES PT
Back to Stats

Visual Capture

Screenshot of entregador.operadora.inc

Detection Info

https://entregador.operadora.inc/
Detected Brand
Shopee
Country
Brazil (based on the use of CEP)
Confidence
100%
HTTP Status
200
Report ID
404fe5a8-fad…
Analyzed
2026-02-24 01:20

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1EAD46CE637A5942746D1818AA079471363397E0E5809C12CFB3EFDDB2A9DD84B07BB70
CONTENT ssdeep
6144:ciXJZOc8dXPc5HFAh48tbL+K8ufR1JOfCCJ55EofIWeRMmlc95OY79++2naoHI:X8Fcp8t+8fQfCCJP97CHI

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
99cc663399cccc99
VISUAL aHash
0000181818180000
VISUAL dHash
304cb2b2b2b24c30
VISUAL wHash
00001818d8d8e4fc
VISUAL colorHash
00000038000
VISUAL cropResistant
8a8ca2aaeaa833b2,304cb2b2b2b24c30

Code Analysis

Risk Score 100/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info
⚡ Supabase Backend

🔬 Threat Analysis Report

• Threat: Phishing
• Target: Shopee users
• Method: Impersonation and form-based data theft
• Exfil: ppyxcanzwxsbsrokvpky.supabase.co (potential)
• Indicators: Mismatched domain, JavaScript obfuscation, requests for personal information.
• Risk: High

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • unicode_escape
  • base64_strings

📡 API Calls Detected

  • /api/app-users/login
  • /api/app-users/save-profile
  • GET
  • /data/regions.json
  • /api/push-subscriptions
  • https://www.google.com/ccm/geo
  • https://play.google.com/store/apps/details?id=com.shopee.spx.driver.brazil&pcampaignid=web_share
  • /api/app-users/reached-delivery
  • /api/send-notification
  • POST
  • /api/app-users/save-cities
  • /api/pushcut
  • /api/proxy/for4payments/pix

☁️ Cloud Backend

  • Supabase: ppyxcanzwxsbsrokvpky.supabase.co

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Domain Mismatch
The domain does not belong to the official brand.
JavaScript Obfuscation
Obfuscation indicates malicious intent.
Requests for personal information
The site requests the user's CEP, potentially leading to further data collection

🔬 Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
Shopee users (Brazil (based on the use of CEP))
Attack Method
Brand impersonation + obfuscated JavaScript
Exfiltration Channel
Supabase Database
Risk Assessment
CRITICAL - Automated credential harvesting with Supabase Database

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Card Stealer, Banking, Personal Info
  • 225 obfuscation techniques

🏢 Brand Impersonation Analysis

Impersonated Brand
Shopee
Official Website
shopee.com.br
Fake Service
Shipping/Availability Check

⚔️ Attack Methodology

Primary Method: Credential Harvesting

The attacker impersonates Shopee and attempts to harvest the user's CEP. This information could be used for account takeover or identity theft. The Javascript obfuscation suggests further data gathering or a redirecting behavior.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
entregador.operadora.inc
Registered
2023-06-13
Registrar
Unknown
Status
active

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.