EN ES PT
Back to Stats

Visual Capture

Screenshot of 121sef.dartello.cc

Detection Info

https://121sef.dartello.cc/trs/
Detected Brand
Blockchain.com
Country
International
Confidence
100%
HTTP Status
200
Report ID
95712217-097…
Analyzed
2026-02-21 11:33

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1BFC1857472511B7F51C381F6F762ABAAF684C356C63B9748A2F9C2C50BC6C2ACE14290
CONTENT ssdeep
96:RBqXmmyCekg3VJr945uH0kzbKWRAZt6ItarZeYp:RBqJle5X25c0QRU6p

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
c0c03b3f3f3fc068
VISUAL aHash
7070707070700000
VISUAL dHash
a6e4e4c4c4e41b80
VISUAL wHash
70fcfc7e7c7e0000
VISUAL colorHash
31007000000
VISUAL cropResistant
8080b217cf888280,80898855452559b8,84535b97974b5780,a6e4e4c4c4e41b80

Code Analysis

Risk Score 76/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Phishing
• Target: Blockchain.com users
• Method: Impersonation and compensation scam
• Exfil: Unknown (Likely aims to steal credentials or crypto through a form)
• Indicators: Domain mismatch, claims of payouts, urgency.
• Risk: HIGH

🔒 Obfuscation Detected

  • fromCharCode
  • unicode_escape

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Domain Mismatch
The domain doesn't match the target brand.
Obfuscation
Javascript is obfuscated to hide malicious behavior.
Impersonation
The site impersonates a well-known brand.
Phishing Tactics
Uses urgency and reward tactics to deceive users

🔬 Comprehensive Threat Analysis

Threat Type
Two-Factor Authentication Stealer
Target
Blockchain.com users (International)
Attack Method
Brand impersonation + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
HIGH - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Personal Info
  • 6 obfuscation techniques

🏢 Brand Impersonation Analysis

Impersonated Brand
Blockchain.com
Official Website
blockchain.com
Fake Service
Blockchain.com compensation payments

Fraudulent Claims

⚔️ Attack Methodology

Primary Method: Brand Impersonation

The attackers are trying to mimic the look and feel of Blockchain.com to steal user's Bitcoin.

Secondary Method: Social Engineering

The site leverages users' trust and the promise of compensation to deceive them into providing information.

Target Blockchain
Bitcoin

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
121sef.dartello.cc
Registered
2024-05-24
Registrar
Unknown
Status
ACTIVE

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.