EN ES PT
Back to Stats

Captura Visual

Screenshot of login-ledgger-load-io-gateway.vercel.app

Informações de Detecção

https://login-ledgger-load-io-gateway.vercel.app/ledger%20form/index.html
Detected Brand
Ledger
Country
International
Confidence
100%
HTTP Status
200
Report ID
d328b929-c28…
Analyzed
2026-03-19 05:15

Hashes de Conteúdo (Similaridade HTML)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T188313074926098264182538A3FF1674AB3828346EB161E4436FA87AD1EF9E5ACC1A4A5
CONTENT ssdeep
24:hRfCLBADenvFZoZJjiMfpRhfl7Xo3VfVXuOvWhwa:TgBIenvEZViMfdftCtXeh1

Hashes Visuais (Similaridade de Captura)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
aad7f0a846e303f2
VISUAL aHash
b69e2c3c1101c301
VISUAL dHash
54346869235b9717
VISUAL wHash
befe3c3d1123c301
VISUAL colorHash
30000e00000
VISUAL cropResistant
fbb7ec9974ecd0a0,a2809acccc8c80aa,54346869235b9717

Análise de Código

Risk Score 85/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Banking 🎣 Personal Info

🔬 Threat Analysis Report

• Ameaça: Phishing
• Alvo: Usuários Ledger
• Método: Falsificação através de um site semelhante.
• Exfil: Provavelmente rouba credenciais e/ou tenta instalar malware.
• Indicadores: Hospedagem gratuita, logotipo da marca, JavaScript ofuscado, envio de formulário.
• Risco: Alto

🔒 Obfuscation Detected

  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings

📡 API Calls Detected

  • GET
  • POST

📊 Detalhamento da Pontuação de Risco

Total Risk Score
90/100

Contributing Factors

Free Hosting
The site uses a free hosting service commonly abused by phishers.
Brand Impersonation
The site displays the Ledger brand logo and attempts to replicate the look and feel of the official Ledger site.
Obfuscated Javascript
JavaScript obfuscation is a common tactic used to hide malicious code.
Form Submission
Presence of a form suggests intent to collect data.

🔬 Análise Integral de Ameaças

Tipo de Ameaça
Banking Credential Harvester
Alvo
Ledger users (International)
Método de Ataque
Brand impersonation + obfuscated JavaScript
Canal de Exfiltração
Form submission (backend endpoint not detected - likely JavaScript-based)
Avaliação de Risco
CRITICAL - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Banking, Personal Info
  • 15 obfuscation techniques

🏢 Análise de Falsificação de Marca

Impersonated Brand
Ledger
Official Website
https://www.ledger.com/
Fake Service
Ledger Live

⚔️ Metodologia de Ataque

Primary Method: Credential Harvesting

The attacker aims to steal user credentials by creating a website that mimics the legitimate Ledger website. This allows them to collect login details for the actual Ledger service.

Secondary Method: Malware distribution

The site might attempt to redirect the user to a malicious download that installs malware to steal crypto.

🌐 Indicadores de Compromisso de Infraestrutura

Domain Information

Domain
login-ledgger-load-io-gateway.vercel.app
Registered
Unknown
Registrar
Unknown
Status
Active

🤖 AI-Extracted Threat Intelligence

😰
"Nunca pensei que aconteceria comigo"
Isso dizem os 2,3 milhões de vítimas a cada ano. Não espere para ser uma estatística.