EN ES PT
Back to Stats

Captura Visual

Screenshot of shorturl.asia

Información de Detección

https://shorturl.asia/1t39x
Detected Brand
IRS
Country
Unknown
Confianza
98%
HTTP Status
200
Report ID
5899dc5e-bc4…
Analyzed
2026-05-14 17:09
Final URL (after redirects)
https://pughcorporation.com/puggh/policies.html

Hashes de Contenido (Similitud HTML)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1F6B1D271B19D683FD04744DA9768736B73E621DDDA4E831996FC036ACBC6D8AEC23005
CONTENT ssdeep
96:T97imVoPVDAZVKbBmCgnNYypivp1b7TsAjixoFu7PX+:JWmiPhAZQoJnNYyiB1hmn+

Hashes Visuales (Similitud de Captura)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
b3774c4c19193e2e
VISUAL aHash
00ffffffffffffff
VISUAL dHash
220c4c5800000000
VISUAL wHash
000020200f0f0f0f
VISUAL colorHash
070000001c0
VISUAL cropResistant
0000806868608040,080c4c5820000000,000020222a204000

Análisis de Código

Risk Score 28/100
Nivel de Amenaza ALTO
⚠️ Phishing Confirmed
Telegram Exfiltration

🔒 Obfuscation Detected

  • unescape

📡 API Calls Detected

  • https://api.telegram.org/bot
  • POST

🔑 Telegram Bot Tokens (1)

  • 8288096133:AAFi...mK5bWvkM

📊 Desglose de Puntuación de Riesgo

Total Risk Score
40/100

Contributing Factors

Telegram Exfiltration
Real-time data exfiltration via Telegram (1 bot token(s) exposed in client-side code)
Code Obfuscation
JavaScript code obfuscated using 2 technique(s) to evade detection

🔬 Análisis Integral de Amenazas

Tipo de Amenaza
Data Exfiltration Campaign
Objetivo
IRS users
Método de Ataque
obfuscated JavaScript
Canal de Exfiltración
Telegram Bot (8288096133:AAFiOKKJ9...)
Evaluación de Riesgo
LOW - Automated credential harvesting with Telegram Bot (8288096133:AAFiOKKJ9...)

⚠️ Indicators of Compromise

  • 1 Telegram bot token(s)
  • 2 obfuscation techniques

🏢 Análisis de Suplantación de Marca

Impersonated Brand
IRS
Official Website
N/A
Fake Service
Credential harvesting service

⚔️ Metodología de Ataque

Primary Method: Malicious Landing Page

Uses IRS branding to appear legitimate in search results, social media, or advertising networks. Designed to redirect victims to phishing pages or distribute malware while maintaining appearance of authenticity.

Secondary Method: JavaScript Obfuscation

Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.

📡 Infraestructura de Comando y Control Telegram

Bot Token (Masked)
8288096133:AAFi...mK5bWvkM
Bot ID
8288096133
Group/Chat ID
Unknown
Operator Language
Unknown

💬 Message Templates (3)

ID Portugués Inglés Trigger

🌐 Indicadores de Compromiso de Infraestructura

Domain Information

Dominio
shorturl.asia
Registered
2020-06-19 06:17:49+00:00
Registrar
PDR Ltd. d/b/a PublicDomainRegistry.com
Estado
Active (older domain)

Hosting Information

Provider
PDR Ltd. d/b/a PublicDomainRegistry.com
ASN

🤖 AI-Extracted Threat Intelligence

😰
"Nunca pensé que me pasaría a mí"
Esto dicen las 2.3 millones de víctimas cada año. No esperes a ser una estadística.