EN ES PT
Back to Stats

Captura Visual

Screenshot of 7b6f4116.concc.pages.dev

Informações de Detecção

https://7b6f4116.concc.pages.dev/
Detected Brand
Ledger
Country
International
Confidence
100%
HTTP Status
200
Report ID
5394c6c0-171…
Analyzed
2026-02-08 21:22

Hashes de Conteúdo (Similaridade HTML)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1E441A635A1025E3B022756EAFAA0AF509163D34DCF0B5D18F7F291FA13E0C61D81A4DC
CONTENT ssdeep
24:nxAgfC8zwsRE0w9RYFReh2aMHWsYSwJ3G9DZnij2XXl3hll3g8CmHFl7Xo9gKslv:nxAgG92iMySmGhZrxHFZd

Hashes Visuais (Similaridade de Captura)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
ea57f029568313f8
VISUAL aHash
e6d22c341101c3c1
VISUAL dHash
44366c69a54b9797
VISUAL wHash
e6dafc3d110303c3
VISUAL colorHash
38000e00000
VISUAL cropResistant
a200198e8e6180a2,44366c69a54b9797

Análise de Código

Risk Score 79/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Banking

🔬 Threat Analysis Report

• Ameaça: Phishing
• Alvo: Usuários Ledger
• Método: Personificação por meio de um site falso.
• Exfil: Desconhecido (devido à ofuscação)
• Indicadores: Hospedagem gratuita, logotipo da marca, envio de formulário JavaScript, ofuscação.
• Risco: Alto

🔒 Obfuscation Detected

  • fromCharCode
  • unescape
  • unicode_escape

🎯 Kit Endpoints

  • https://www.ledger.com/
  • http://fb.me/use-check-prop-types
  • https://7b6f4116.concc.pages.dev/assets/index-Csrgvl6_.js
  • https://server0002.mn19indexpre.xyz/api/v1/sm
  • http://jedwatson.github.io/classnames
  • https://getbootstrap.com/)
  • https://embed.${l}/${n}/${i}`,c.charset=
  • https://reactrouter.com/en/main/routers/picking-a-router.`}function
  • http://localhost
  • https://popper.js.org)
  • https://reactjs.org/docs/error-decoder.html?invariant=

📊 Detalhamento da Pontuação de Risco

Total Risk Score
90/100

Contributing Factors

Free hosting and brand impersonation
The use of free hosting combined with the Ledger logo makes it highly suspicious
Javascript Obfuscation
Obfuscation hides the malicious code, indicating an attempt to evade detection
Form Submission
Detection of forms on a suspicious website can indicate a credential harvesting or data exfiltration

🔬 Análise Integral de Ameaças

Tipo de Ameaça
Banking Credential Harvester
Alvo
Ledger users (International)
Método de Ataque
Brand impersonation + credential harvesting forms + obfuscated JavaScript
Canal de Exfiltração
Form submission (backend endpoint not detected - likely JavaScript-based)
Avaliação de Risco
HIGH - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Banking
  • 15 obfuscation techniques

🏢 Análise de Falsificação de Marca

Impersonated Brand
Ledger
Official Website
https://www.ledger.com/
Fake Service
Ledger wallet login

⚔️ Metodologia de Ataque

Primary Method: Credential Harvesting

The site is designed to trick users into entering their Ledger login details or seed phrase. These credentials are then stolen.

Secondary Method: Malware Injection (potential)

The obfuscated Javascript could potentially deploy malicious code, such as keyloggers or cryptocurrency stealers.

🌐 Indicadores de Compromisso de Infraestrutura

🦠 Malicious Files

Main File
index-Csrgvl6_.js
File Size

🔬 JavaScript Deep Analysis

Operator Language
English (1%)
Total Code Size
427,0 KB

🔗 API Endpoints Detected

Other
6
Backend API
1

🔐 Obfuscation Detected

  • : Heavy

🤖 AI-Extracted Threat Intelligence

🎯 Malicious Files Identified

Main Drainer
index-Csrgvl6_.js
File Size
427KB

Similar Websites

Pages with identical visual appearance (based on perceptual hash)

😰
"Nunca pensei que aconteceria comigo"
Isso dizem os 2,3 milhões de vítimas a cada ano. Não espere para ser uma estatística.