EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

https://h7.hkfqgs6.vu/wp-content/jazze/dml.html
Detected Brand
Unknown
Country
International
Confidence
100%
HTTP Status
200
Report ID
996e4999-96dโ€ฆ
Analyzed
2026-02-18 03:10

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T10D31D030506A5C26AA83DAEC73E4560B36D5C213CF83261153F8C35E59DBE81DE693C5
CONTENT ssdeep
24:n/CExWUhs4hjXB9WhYwgJYSXxF4OadIMwN9uAlcyHHcnQ7uxPoYSBu72lS:nJWUPho1kRFLayjHVlZ80+Pf2U

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
9999cc6666333399
VISUAL aHash
181c180018000000
VISUAL dHash
30b2b24c30040000
VISUAL wHash
fcfcfce420303030
VISUAL colorHash
070000001c0
VISUAL cropResistant
30b2b24c30040000

Code Analysis

Risk Score 100/100
Threat Level ALTO
โš ๏ธ Phishing Confirmed
๐ŸŽฃ Credential Harvester ๐ŸŽฃ OTP Stealer
Telegram Exfiltration

๐Ÿ”ฌ Threat Analysis Report

โ€ข Threat: Phishing
โ€ข Target: Unspecified
โ€ข Method: Credential Harvesting
โ€ข Exfil: Telegram
โ€ข Indicators: Recent domain, generic login page, JavaScript, obfuscation.
โ€ข Risk: High

๐Ÿ”’ Obfuscation Detected

  • atob

๐Ÿ“ก API Calls Detected

  • https://api.ipify.org?format=json

๐Ÿ”‘ Telegram Bot Tokens (1)

  • 7311472839:AAFE...ZnjL4EQE

๐Ÿ“Š Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Recent Domain
Domain is less than 30 days old.
JavaScript Form Submission
JavaScript is used to submit the form, which could involve manipulation.
Obfuscation
Code obfuscation is used to hide code and evade detection.
Telegram Token
Telegram token detected, potential data exfiltration channel.

๐Ÿ”ฌ Comprehensive Threat Analysis

Threat Type
Two-Factor Authentication Stealer
Target
General public
Attack Method
credential harvesting forms + obfuscated JavaScript
Exfiltration Channel
Telegram Bot (7311472839:AAFEefugB...)
Risk Assessment
CRITICAL - Automated credential harvesting with Telegram Bot (7311472839:AAFEefugB...)

โš ๏ธ Indicators of Compromise

  • 1 Telegram bot token(s)
  • Kit types: Credential Harvester, OTP Stealer
  • 2 obfuscation techniques

๐Ÿข Brand Impersonation Analysis

โš”๏ธ Attack Methodology

Primary Method: Credential Harvesting

The site attempts to steal user credentials through a fake login form. The information gathered can be used for unauthorized access.

Secondary Method: Data Exfiltration via Telegram

Stolen credentials will be sent to the attackers through a Telegram bot. The use of a Telegram bot allows for stealthy and automated transfer of information.

๐Ÿ“ก Telegram Command & Control Infrastructure

Bot Token (Masked)
7311472839:AAFE...ZnjL4EQE
Bot ID
7311472839
Group/Chat ID
Unknown
Operator Language
Unknown

๐Ÿ’ฌ Message Templates (3)

ID Portuguese English Trigger

๐ŸŒ Infrastructure Indicators of Compromise

Domain Information

Domain
h7.hkfqgs6.vu
Registered
2024-02-13
Registrar
None
Status
ACTIVE

๐Ÿค– AI-Extracted Threat Intelligence

๐Ÿ˜ฐ
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.