EN ES PT
Back to Stats

Visual Capture

Screenshot of login-ledgger-load-io-gateway.vercel.app

Detection Info

https://login-ledgger-load-io-gateway.vercel.app/ledger%20form/index.html
Detected Brand
Ledger
Country
International
Confidence
100%
HTTP Status
200
Report ID
d328b929-c28…
Analyzed
2026-03-19 05:15

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T188313074926098264182538A3FF1674AB3828346EB161E4436FA87AD1EF9E5ACC1A4A5
CONTENT ssdeep
24:hRfCLBADenvFZoZJjiMfpRhfl7Xo3VfVXuOvWhwa:TgBIenvEZViMfdftCtXeh1

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
aad7f0a846e303f2
VISUAL aHash
b69e2c3c1101c301
VISUAL dHash
54346869235b9717
VISUAL wHash
befe3c3d1123c301
VISUAL colorHash
30000e00000
VISUAL cropResistant
fbb7ec9974ecd0a0,a2809acccc8c80aa,54346869235b9717

Code Analysis

Risk Score 85/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Banking 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Phishing
• Target: Ledger users
• Method: Impersonation through a look-alike website.
• Exfil: Likely steals credentials and/or attempts to install malware.
• Indicators: Free hosting, brand logo, obfuscated JavaScript, form submission.
• Risk: High

🔒 Obfuscation Detected

  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings

📡 API Calls Detected

  • GET
  • POST

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Free Hosting
The site uses a free hosting service commonly abused by phishers.
Brand Impersonation
The site displays the Ledger brand logo and attempts to replicate the look and feel of the official Ledger site.
Obfuscated Javascript
JavaScript obfuscation is a common tactic used to hide malicious code.
Form Submission
Presence of a form suggests intent to collect data.

🔬 Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
Ledger users (International)
Attack Method
Brand impersonation + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
CRITICAL - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Banking, Personal Info
  • 15 obfuscation techniques

🏢 Brand Impersonation Analysis

Impersonated Brand
Ledger
Official Website
https://www.ledger.com/
Fake Service
Ledger Live

⚔️ Attack Methodology

Primary Method: Credential Harvesting

The attacker aims to steal user credentials by creating a website that mimics the legitimate Ledger website. This allows them to collect login details for the actual Ledger service.

Secondary Method: Malware distribution

The site might attempt to redirect the user to a malicious download that installs malware to steal crypto.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
login-ledgger-load-io-gateway.vercel.app
Registered
Unknown
Registrar
Unknown
Status
Active

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.