EN ES PT
Back to Stats
95 Risk Score

High Risk

Threat Level: ALTO • Impersonating: AT&T

⚠ Risk Factors

  • Brand impersonation of AT&T on non-official domain
  • JavaScript obfuscation detected (7 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected

Visual Capture

Screenshot of docs.google.com

Detection Info

https://docs.google.com/presentation/d/e/2PACX-1vSIgLWXw4RWhax_OCr43KLAiUQssXX5XMcqHVhQQbCZrDtZzwjVoKVuqIXeOwryiQeDWumWS2MvYD7h/pub?start=false&loop=false&delayms=3000&slide=id.p
Detected Brand
AT&T
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
0aead575-b1a…
Analyzed
2026-01-09 08:39

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T15EF24232C2422132E6FF52E2A8F0777E2593832ECE0714411B3C9B95AFFFD956546989
CONTENT ssdeep
768:i570L/rREhAP2Odneec+CLpdhDNe1ARkapjTdPUxkUi:bEhAP2Odneec+CLpdhDNe1ARkapjTdP9

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
e666999999cc6c38
VISUAL aHash
ffe7e7e7e7e7ffff
VISUAL dHash
004d4d4d0e160004
VISUAL wHash
3f27070703030f0f
VISUAL colorHash
070000001c0
VISUAL cropResistant
004d4d4d0e160004

Code Analysis

Risk Score 95/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings