EN ES PT
Back to Stats

Visual Capture

Screenshot of www.token.imtoken.bmxuij.cn

Detection Info

http://www.token.imtoken.bmxuij.cn/
Detected Brand
imToken
Country
China
Confidence
100%
HTTP Status
200
Report ID
4aedddfc-dad…
Analyzed
2026-01-19 11:52
Final URL (after redirects)
http://41344422xyz.imtoken1.bmxuij.cn/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1A56224705889EE3701E7A6D1CB71AB3DE1C192A6CA765D05C2F8878D4F46FADCE03906
CONTENT ssdeep
192:VjoEJKsPVzRACInJ+PmifkYK76AL4zKSpwj5bXkTRLTT3SPo73q:Wpsa6Zw6nlb6Wa

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
aced43929238e1ed
VISUAL aHash
fffffbffff000000
VISUAL dHash
1c2213372452f0d4
VISUAL wHash
ffffc3d7d7000000
VISUAL colorHash
070020001c0
VISUAL cropResistant
163803121f372642,0c3232320aa49409,809248b2b2969680,00143070ccd4d4d4

Code Analysis

Risk Score 85/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Banking 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing kit
• Target: imToken users in China
• Method: Fake login form stealing user credentials
• Exfil: Data sent to external URL
• Indicators: Domain mismatch, suspicious URL, obfuscated JavaScript
• Risk: HIGH - Immediate credential theft

🔐 Credential Harvesting Forms

🔒 Obfuscation Detected

  • fromCharCode
  • unescape
  • document.write
  • unicode_escape
  • base64_strings

📡 API Calls Detected

  • text/html
  • POST

📤 Form Action Targets

  • https://d0a5ba0b.sibforms.com/serve/MUIEAEz3dQk0fDrweVnmTpQQbZ2rw7qQ0gwoG6uu7cmDs0Qbh-IH9n_9vnkOQcAbKkvvwJN3s6pdlocND15cgu8iWZpPKmLHrRotNy0Y7OWZCbE6s_ufjQdZ1gF97q8wMCufNErgiw-O2ZXG15IuswkxLv9-ibQzyNEr6vAKCXMI0DSy_0nRpnTgnUV27alZPD76WvkNNHW5Ylmh
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.