EN ES PT
Back to Stats
100 Risk Score

High Risk

Threat Level: ALTO • Impersonating: Banco Original

⚠ Fatores de Risco

  • Falsificação da marca Banco Original em domínio não oficial
  • Contém 47 formulário(s) com submissão JavaScript
  • Ofuscação JavaScript detectada (7 padrões)
  • Indicadores de roubo de credenciais detectados
  • Indicadores de roubo de otp/2fa detectados

Visual Capture

Screenshot of www.weps.org

Detection Info

https://www.weps.org/company/banco-original
Detected Brand
Banco Original
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
c939035c-bf5…
Analyzed
2026-01-09 22:36

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T17CB24410B306D82708D386C556215B1DB2B6D7C4C3732686BFF9C3B61BAADA4E912E1D
CONTENT ssdeep
384:zrd7E2naWUsoh1mfsfiKFVOy3OTlH5VkhMDuOl5zK+5Qup3mJc1:942Usoh1mUfikVOy3OTlTkyRK031

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
9f1f6160603c1f1f
VISUAL aHash
00bf1f9fffffffff
VISUAL dHash
1a60792c58787828
VISUAL wHash
000f0d0f8f8f8f9f
VISUAL colorHash
070010080c0
VISUAL cropResistant
6479797a58717828,0210223e3e220200,5fffcbc9e9870e46

Code Analysis

Risk Score 100/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Banking 🎣 Personal Info

🔐 Credential Harvesting Forms

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings