EN ES PT
Back to Stats

Visual Capture

Screenshot of sdnancol01.sch.id

Detection Info

https://sdnancol01.sch.id/dwagg/sso.login/login2.php
Detected Brand
Plala
Country
Japan
Confidence
100%
HTTP Status
200
Report ID
7f8170fc-2b3…
Analyzed
2026-01-21 05:44

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1A1B1C01493412B0E64A591F6C3606FA843E28C2ED7321958985EE63F1CCD54EED6BBFC
CONTENT ssdeep
96:jN4CpfHSfo47lGCty5vk+7TSTre5b1/LhC5Sb3yJSLP0z3lKZVwcbwYxyCPoZz0F:jWUyUBWcb10KibALJxawD

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
969339389e9998dc
VISUAL aHash
1c243c3c3c000000
VISUAL dHash
394d686865140000
VISUAL wHash
1c243c3c3f030f0f
VISUAL colorHash
07050000400
VISUAL cropResistant
394d686865140000

Code Analysis

Risk Score 74/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 Banking

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing targeting Plala users.
• Target: Plala users in Japan.
• Method: Fake login form steals username and password.
• Exfil: Data sent to cgi-binsso/pf/agent_sso.php.
• Indicators: Domain mismatch, Indonesian (.id) domain, obfuscated JavaScript.
• Risk: HIGH - Immediate credential theft.

🔐 Credential Harvesting Forms

🔒 Obfuscation Detected

  • fromCharCode
  • hex_escape
  • base64_strings

📤 Form Action Targets

  • cgi-binsso/pf/agent_sso.php

Scan History for sdnancol01.sch.id

Found 1 other scan for this domain

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.