EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

https://betza-game.com/
Detected Brand
Unknown
Country
International
Confidence
100%
HTTP Status
200
Report ID
f2562b7e-405โ€ฆ
Analyzed
2026-02-16 16:07

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T179E229B4A230D335B1C24BD8DA6425287A5FE1DCD7C695B4E388AF11B0D6CECD9260CB
CONTENT ssdeep
384:4r/jMJgubTPRhiXkdvNTDhPhLxeAxeDWNW1Tp34PxeeJEmuW3AsV6QRWOMd:4r/jMJguZhhPhleMeDGCSPxeeWmHtzW

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
c31e3cb163f34b48
VISUAL aHash
801670e060766e00
VISUAL dHash
0c34e6cbc3ccccc1
VISUAL wHash
8016f2e070feff60
VISUAL colorHash
38200448000
VISUAL cropResistant
1230929aa6e2eaea,8e9ab365666a4c74,2d1cdcc7e3f8fdf9,80100c4c4c081000,0c34e6cbc3ccccc1

Code Analysis

Risk Score 100/100
Threat Level ALTO
โš ๏ธ Phishing Confirmed
๐ŸŽฃ Credential Harvester ๐ŸŽฃ OTP Stealer ๐ŸŽฃ Card Stealer ๐ŸŽฃ Banking ๐ŸŽฃ Personal Info
WebSocket C2

๐Ÿ”ฌ Threat Analysis Report

โ€ข Threat: Credential Harvesting Phishing
โ€ข Target: Unsuspecting users
โ€ข Method: Deceptive registration form.
โ€ข Exfil: wss://gambler-work.com/api/ws
โ€ข Indicators: Recent domain, Javascript obfuscation, form submission.
โ€ข Risk: High

๐Ÿ”’ Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • base64_strings

๐ŸŽฏ Kit Endpoints

  • http://developers.facebook.com/policy/].
  • https://crypto.sardine.ai/buy
  • https://betza-game.com/_next/static/chunks/4bd1b696-ad7506e6ce5b48e8.js
  • https://react.dev/link/hydration-mismatch
  • https://betza-game.com/_next/static/chunks/58211-d9d578b8de9e3293.js
  • https://qa.meldcrypto.com/
  • https://connect.facebook.net/en_US/fbevents.js
  • https://betza-game.com/_next/static/chunks/53331-ed5951db58e70abe.js
  • http://localhost:3001
  • https://betza-game.com/_next/static/chunks/53069-c3a95b8ce62cca48.js
  • https://betza-game.com/_next/static/chunks/49080-aa8410705e183b35.js
  • https://gambler-work.com/api
  • https://gambler-work.com/payser
  • https://react.dev/errors/
  • https://guarda.com/buy/
  • https://www.facebook.com/privacy_sandbox/topics/registration/
  • https://betza-game.com/_next/static/chunks/92148-6f19ac7166461fa8.js
  • https://www.facebook.com/tr/
  • https://betza-game.com/_next/static/chunks/app/layout-2344be9881d79b44.js
  • https://ramp.network/buy
  • https://exchange.mercuryo.io/
  • https://changelly.com/buy-crypto
  • https://openocean.banxa.com/
  • https://www.moonpay.com/buy/btc
  • https://nextjs.org/docs/messages/react-hydration-error
  • https://betza-game.com/_next/static/chunks/app/(auth)/layout-2f72bfb00bd0ee9b.js
  • https://changenow.io/buy/bitcoin
  • https://global.transak.com/
  • https://betza-game.com/_next/static/chunks/34230-e87c8d35c9fa1ab6.js
  • https://betza-game.com/_next/static/chunks/63712-08d55a4030f898f7.js

๐Ÿ“ก API Calls Detected

  • POST
  • GET

๐Ÿ“Š Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Recent Domain
Domain is only 6 days old.
JavaScript Obfuscation
Obfuscation used to hide potentially malicious code.
Form with Credentials
Form collects email and password, a strong indicator of phishing

๐Ÿ”ฌ Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
General public
Attack Method
real-time WebSocket exfiltration + obfuscated JavaScript
Exfiltration Channel
WebSocket (1 endpoints)
Risk Assessment
CRITICAL - Automated credential harvesting with WebSocket (1 endpoints)

โš ๏ธ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Card Stealer, Banking, Personal Info
  • 116 obfuscation techniques

๐Ÿข Brand Impersonation Analysis

Impersonated Brand
Unknown
Fake Service
Gaming/Reward based service

Fraudulent Claims

โš”๏ธ Attack Methodology

Primary Method: Credential Harvesting

The website presents a registration form designed to steal user credentials. The Javascript code likely attempts to intercept the entered data and send it to the attackers.

Secondary Method: Social Engineering

The site uses social engineering tactics like offering a 'free reward' to entice users to enter their information.

๐ŸŒ Infrastructure Indicators of Compromise

๐Ÿฆ  Malicious Files

Main File
fbevents.js
File Size

๐Ÿ”ฌ JavaScript Deep Analysis

Operator Language
English (1%)
Sophistication Level
Basic
Total Code Size
1017.7ย KB

๐Ÿ”— API Endpoints Detected

Other
25
Backend API
1
WebSocket (Real-time)
1

๐Ÿ” Obfuscation Detected

  • : Moderate
  • : Moderate
  • : Moderate
  • : None
  • : Light
  • : Light
  • : Light
  • : Light
  • : Light
  • : Light
  • : None
  • : Light
  • : Light
  • : Light
  • : Light
  • : Light
  • : Light
  • : Light
  • : Light

๐Ÿค– AI-Extracted Threat Intelligence

๐ŸŽฏ Malicious Files Identified

Main Drainer
fbevents.js
File Size
1019KB

Scan History for betza-game.com

Found 1 other scan for this domain

๐Ÿ˜ฐ
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.