EN ES PT
Back to Stats
100 Risk Score

High Risk

Threat Level: ALTO • Impersonating: Allegro Lokalnie

⚠ Risk Factors

  • Contains 1 form(s) with JavaScript submission
  • JavaScript obfuscation detected (7 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected
  • WebSocket connection for real-time C2 communication

Visual Capture

Screenshot of allegrolokalnie.pl-smart6264221.sbs

Detection Info

https://allegrolokalnie.pl-smart6264221.sbs
Detected Brand
Allegro Lokalnie
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
70dcfe15-456…
Analyzed
2026-01-10 02:12
Final URL (after redirects)
https://allegrolokalnie.pl/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1C055047AE80D5A0A707775CDE3DC0D8FE995F357E32218E696C5DF31818A814B82A87C
CONTENT ssdeep
1536:8zQCfmkQDQXhNC8eqkfWKwPFwqGutEqshNC8eqkfWKwFPw+cutEQiJnP6RrSuWTC:sfqQXhNSPGEqshNSBGE1hNS5GEZJ1X5

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
b660539b9b166b26
VISUAL aHash
000000ffffffffff
VISUAL dHash
6917860e2a2b2c0d
VISUAL wHash
00000000ffffffff
VISUAL colorHash
06000c08000
VISUAL cropResistant
46282f2b2c2f0c0c,e8290d169787868e

Code Analysis

Risk Score 100/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Banking 🎣 Personal Info
WebSocket C2

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings