EN ES PT
Back to Stats
95 Risk Score

High Risk

Threat Level: ALTO • Impersonating: VK

⚠ Risk Factors

  • JavaScript obfuscation detected (6 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected

Visual Capture

Screenshot of away.vk.com

Detection Info

https://away.vk.com/away.php?rh=ed5bc5bb-a7ba-499f-9689-ef26703d6392
Detected Brand
VK
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
c61e86f6-3b3…
Analyzed
2026-01-06 03:06
Final URL (after redirects)
https://away.vk.com/challenge.html?tid=rLBrZ74wpNi39K7fl-uUR0kNatMQgQ&hash429=fNJbXE1uO6KvLB7fPCATq1pEJPyYblmruxxOF8PEiqAYa5lbNIwwCLT9V2fY86U079RxgV6qaLB_BNX1a05BOyH_ZZ5ZI-2FpDRHXCOnALdTgW7aSJEaxkY5LSczdYUDDjh7hGqDihLF6oj9&sign=ftGTcCbjJX_mPiYV4O9TxQ&back=https%3A%2F%2Faway.vk.com%2Faway.php%3Frh%3Ded5bc5bb-a7ba-499f-9689-ef26703d6392&origin=&lang_id=

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T16CD172E4AA3CA63D140F87ACCBAEB681235FA0EDF3170554638E96B10587E6CE946C54
CONTENT ssdeep
96:e35KFSe0BlTSc/Q04JvN/Un4jFSe0BlTSc/Q04JWatPTOYuFA9ed/WqtuxE:ZAN3J4JvBAN3J4J/iVW9eJW4uu

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
cccc3333cccc6633
VISUAL aHash
0000181818180000
VISUAL dHash
100c32b2b2320c10
VISUAL wHash
3c3c3c3c1c1c0000
VISUAL colorHash
070000001c0
VISUAL cropResistant
100c32b2b2320c10

Code Analysis

Risk Score 95/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • document.write
  • base64_strings