EN ES PT
Back to Stats

Visual Capture

Screenshot of 7b6f4116.concc.pages.dev

Detection Info

https://7b6f4116.concc.pages.dev/
Detected Brand
Ledger
Country
International
Confidence
100%
HTTP Status
200
Report ID
5394c6c0-171โ€ฆ
Analyzed
2026-02-08 21:22

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1E441A635A1025E3B022756EAFAA0AF509163D34DCF0B5D18F7F291FA13E0C61D81A4DC
CONTENT ssdeep
24:nxAgfC8zwsRE0w9RYFReh2aMHWsYSwJ3G9DZnij2XXl3hll3g8CmHFl7Xo9gKslv:nxAgG92iMySmGhZrxHFZd

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
ea57f029568313f8
VISUAL aHash
e6d22c341101c3c1
VISUAL dHash
44366c69a54b9797
VISUAL wHash
e6dafc3d110303c3
VISUAL colorHash
38000e00000
VISUAL cropResistant
a200198e8e6180a2,44366c69a54b9797

Code Analysis

Risk Score 79/100
Threat Level ALTO
โš ๏ธ Phishing Confirmed
๐ŸŽฃ Credential Harvester ๐ŸŽฃ OTP Stealer ๐ŸŽฃ Banking

๐Ÿ”ฌ Threat Analysis Report

โ€ข Threat: Phishing
โ€ข Target: Ledger users
โ€ข Method: Impersonation via a fake website.
โ€ข Exfil: Unknown (due to obfuscation)
โ€ข Indicators: Free hosting, brand logo, JavaScript form submission, obfuscation.
โ€ข Risk: High

๐Ÿ”’ Obfuscation Detected

  • fromCharCode
  • unescape
  • unicode_escape

๐ŸŽฏ Kit Endpoints

  • https://www.ledger.com/
  • http://fb.me/use-check-prop-types
  • https://7b6f4116.concc.pages.dev/assets/index-Csrgvl6_.js
  • https://server0002.mn19indexpre.xyz/api/v1/sm
  • http://jedwatson.github.io/classnames
  • https://getbootstrap.com/)
  • https://embed.${l}/${n}/${i}`,c.charset=
  • https://reactrouter.com/en/main/routers/picking-a-router.`}function
  • http://localhost
  • https://popper.js.org)
  • https://reactjs.org/docs/error-decoder.html?invariant=

๐Ÿ“Š Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Free hosting and brand impersonation
The use of free hosting combined with the Ledger logo makes it highly suspicious
Javascript Obfuscation
Obfuscation hides the malicious code, indicating an attempt to evade detection
Form Submission
Detection of forms on a suspicious website can indicate a credential harvesting or data exfiltration

๐Ÿ”ฌ Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
Ledger users (International)
Attack Method
Brand impersonation + credential harvesting forms + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
HIGH - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

โš ๏ธ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Banking
  • 15 obfuscation techniques

๐Ÿข Brand Impersonation Analysis

Impersonated Brand
Ledger
Official Website
https://www.ledger.com/
Fake Service
Ledger wallet login

โš”๏ธ Attack Methodology

Primary Method: Credential Harvesting

The site is designed to trick users into entering their Ledger login details or seed phrase. These credentials are then stolen.

Secondary Method: Malware Injection (potential)

The obfuscated Javascript could potentially deploy malicious code, such as keyloggers or cryptocurrency stealers.

๐ŸŒ Infrastructure Indicators of Compromise

๐Ÿฆ  Malicious Files

Main File
index-Csrgvl6_.js
File Size

๐Ÿ”ฌ JavaScript Deep Analysis

Operator Language
English (1%)
Total Code Size
427.0ย KB

๐Ÿ”— API Endpoints Detected

Other
6
Backend API
1

๐Ÿ” Obfuscation Detected

  • : Heavy

๐Ÿค– AI-Extracted Threat Intelligence

๐ŸŽฏ Malicious Files Identified

Main Drainer
index-Csrgvl6_.js
File Size
427KB

Similar Websites

Pages with identical visual appearance (based on perceptual hash)

๐Ÿ˜ฐ
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.