EN ES PT
Back to Stats

Captura Visual

Screenshot of 7b6f4116.concc.pages.dev

Información de Detección

https://7b6f4116.concc.pages.dev/
Detected Brand
Ledger
Country
International
Confidence
100%
HTTP Status
200
Report ID
5394c6c0-171…
Analyzed
2026-02-08 21:22

Hashes de Contenido (Similitud HTML)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1E441A635A1025E3B022756EAFAA0AF509163D34DCF0B5D18F7F291FA13E0C61D81A4DC
CONTENT ssdeep
24:nxAgfC8zwsRE0w9RYFReh2aMHWsYSwJ3G9DZnij2XXl3hll3g8CmHFl7Xo9gKslv:nxAgG92iMySmGhZrxHFZd

Hashes Visuales (Similitud de Captura)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
ea57f029568313f8
VISUAL aHash
e6d22c341101c3c1
VISUAL dHash
44366c69a54b9797
VISUAL wHash
e6dafc3d110303c3
VISUAL colorHash
38000e00000
VISUAL cropResistant
a200198e8e6180a2,44366c69a54b9797

Análisis de Código

Risk Score 79/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Banking

🔬 Threat Analysis Report

• Amenaza: Phishing
• Objetivo: Usuarios de Ledger
• Método: Impersonación a través de un sitio web falso.
• Exfil: Desconocido (debido a la ofuscación)
• Indicadores: Alojamiento gratuito, logotipo de la marca, envío de formulario JavaScript, ofuscación.
• Riesgo: Alto

🔒 Obfuscation Detected

  • fromCharCode
  • unescape
  • unicode_escape

🎯 Kit Endpoints

  • https://www.ledger.com/
  • http://fb.me/use-check-prop-types
  • https://7b6f4116.concc.pages.dev/assets/index-Csrgvl6_.js
  • https://server0002.mn19indexpre.xyz/api/v1/sm
  • http://jedwatson.github.io/classnames
  • https://getbootstrap.com/)
  • https://embed.${l}/${n}/${i}`,c.charset=
  • https://reactrouter.com/en/main/routers/picking-a-router.`}function
  • http://localhost
  • https://popper.js.org)
  • https://reactjs.org/docs/error-decoder.html?invariant=

📊 Desglose de Puntuación de Riesgo

Total Risk Score
90/100

Contributing Factors

Free hosting and brand impersonation
The use of free hosting combined with the Ledger logo makes it highly suspicious
Javascript Obfuscation
Obfuscation hides the malicious code, indicating an attempt to evade detection
Form Submission
Detection of forms on a suspicious website can indicate a credential harvesting or data exfiltration

🔬 Análisis Integral de Amenazas

Tipo de Amenaza
Banking Credential Harvester
Objetivo
Ledger users (International)
Método de Ataque
Brand impersonation + credential harvesting forms + obfuscated JavaScript
Canal de Exfiltración
Form submission (backend endpoint not detected - likely JavaScript-based)
Evaluación de Riesgo
HIGH - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Banking
  • 15 obfuscation techniques

🏢 Análisis de Suplantación de Marca

Impersonated Brand
Ledger
Official Website
https://www.ledger.com/
Fake Service
Ledger wallet login

⚔️ Metodología de Ataque

Primary Method: Credential Harvesting

The site is designed to trick users into entering their Ledger login details or seed phrase. These credentials are then stolen.

Secondary Method: Malware Injection (potential)

The obfuscated Javascript could potentially deploy malicious code, such as keyloggers or cryptocurrency stealers.

🌐 Indicadores de Compromiso de Infraestructura

🦠 Malicious Files

Main File
index-Csrgvl6_.js
File Size

🔬 JavaScript Deep Analysis

Operator Language
English (1%)
Total Code Size
427,0 KB

🔗 API Endpoints Detected

Other
6
Backend API
1

🔐 Obfuscation Detected

  • : Heavy

🤖 AI-Extracted Threat Intelligence

🎯 Malicious Files Identified

Main Drainer
index-Csrgvl6_.js
File Size
427KB

Similar Websites

Pages with identical visual appearance (based on perceptual hash)

😰
"Nunca pensé que me pasaría a mí"
Esto dicen las 2.3 millones de víctimas cada año. No esperes a ser una estadística.