EN ES PT
Back to Stats

Visual Capture

Screenshot of okqianbaoxiazaigw.com.cn

Detection Info

https://okqianbaoxiazaigw.com.cn/
Detected Brand
OKX
Country
International
Confidence
95%
HTTP Status
200
Report ID
8cea71fd-7f4…
Analyzed
2026-05-23 10:12

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T16FE2EB74A1A6BE7F5093D2E5A7309B4F72D1D38ACA77470AA3F8939E1BC2C41CD51089
CONTENT ssdeep
384:J5x9TnQ36Lf1cUnbTkhv4jcSIiFRLPUJJ:L766Lf1cskhgjcS/tUD

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
f37246adcc6c25b0
VISUAL aHash
00000000ffffffff
VISUAL dHash
86888c9140526d2b
VISUAL wHash
00000000ffffffff
VISUAL colorHash
0f000600180
VISUAL cropResistant
44c2c025b3b76dd6,617152530155aa2b,1a87c288cd9c9823

Code Analysis

Risk Score 65/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 OTP Stealer

🔬 Threat Analysis Report

• Threat: Cryptocurrency Wallet Phishing
• Target: OKX Wallet users
• Method: Brand impersonation and malicious redirects
• Exfil: Obfuscated JS exfiltration
• Indicators: Mismatched domain, obfuscated code, fake wallet portal
• Risk: Critical

🔒 Obfuscation Detected

  • eval
  • unescape
  • hex_escape
  • unicode_escape
  • js_packer
  • base64_strings

📊 Risk Score Breakdown

Total Risk Score
95/100

Contributing Factors

Impersonation
High-fidelity brand clone
Technical
Obfuscated JS payloads for data harvesting

🔬 Comprehensive Threat Analysis

Threat Type
Two-Factor Authentication Stealer
Target
OKX users (International)
Attack Method
Brand impersonation + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
HIGH - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: OTP Stealer
  • 1159 obfuscation techniques

🏢 Brand Impersonation Analysis

Impersonated Brand
OKX
Official Website
https://www.okx.com
Fake Service
OKX Wallet Restoration

Fraudulent Claims

⚔️ Attack Methodology

Primary Method: Credential Harvesting

Uses a fake restoration interface to prompt users for recovery phrases.

Secondary Method: Malicious Redirect

Promotes external suspicious links (AG6.ORG) to further engage victims.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
okqianbaoxiazaigw.com.cn
Registered
2026-03-24
Registrar
Unknown
Status
active

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.