EN ES PT
Back to Stats

Visual Capture

Screenshot of www.engelhardtschmuck.de

Detection Info

https://www.engelhardtschmuck.de/hgbutdj/bla1wet/dguyksx/log-in/index.php
Detected Brand
DKB
Country
International
Confidence
95%
HTTP Status
200
Report ID
eb9af0d1-f4c…
Analyzed
2026-03-14 01:39

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T13EA197131B04993F79CB899C8F35962AB1DF958BE766238011F6CB3981C3EC2DE58C18
CONTENT ssdeep
96:aGvEFaHyWUBGzRBYLg6Hw74FWClR2SxNZWXPurXI5lsqRj:aiE03mwUFRRp94G4Ll

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
e3b6489c63b6499c
VISUAL aHash
ffffffe7ffffff00
VISUAL dHash
800c0c4d004000d0
VISUAL wHash
20830303c0fccf00
VISUAL colorHash
070000001c0
VISUAL cropResistant
800c0c4d0c000000,00100c32b2320c30,6090906080d0d02c

Code Analysis

Risk Score 53/100
Threat Level ALTO
āš ļø Phishing Confirmed
šŸŽ£ Credential Harvester

šŸ”¬ Threat Analysis Report

• Threat: Credential Harvesting
• Target: DKB Bank
• Method: Impersonation through a fake login page.
• Exfil: Likely to an external server via the form action (infos.php)
• Indicators: Login form mimicking DKB's design.
• Risk: HIGH

šŸ” Credential Harvesting Forms

šŸ”’ Obfuscation Detected

  • fromCharCode

šŸ“” API Calls Detected

  • ./sse-server.php

šŸ“¤ Form Action Targets

  • infos.php

šŸ“Š Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Suspicious Form
Presence of a login form on a domain unrelated to the target brand.
Domain Mismatch
The domain does not match the target brand, indicating an attempt at impersonation.
Credential Harvesting
The website is designed to capture sensitive login information.

šŸ”¬ Comprehensive Threat Analysis

Threat Type
Credential Harvesting Kit
Target
DKB users (International)
Attack Method
Brand impersonation + credential harvesting forms + obfuscated JavaScript
Exfiltration Channel
HTTP POST to backend
Risk Assessment
MEDIUM - Automated credential harvesting with HTTP POST to backend

āš ļø Indicators of Compromise

  • Kit types: Credential Harvester
  • 2 obfuscation techniques

šŸ¢ Brand Impersonation Analysis

Impersonated Brand
DKB
Fake Service
DKB Banking Login

āš”ļø Attack Methodology

Primary Method: Credential Harvesting

The attacker sets up a fake login page that mimics DKB's website. Users are tricked into entering their credentials, which are then harvested.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
engelhardtschmuck.de
Registered
None
Registrar
None
Status
None

šŸ¤– AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.