Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E7B1EF62D480EC271622CBC0B11167BAE48B416EDF1B1C52D5F40FAAF7A4C64C95EADE |
|
CONTENT
ssdeep
|
48:T4phY9YcTHF4CU4kGtjtw5onZo4GDH3ChDHRjDHWf6DHGhDH3G25KGADAzCDQfoQ:TgOPftjWl4SOVBEmD01mPBFH0/F0/SX |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
92699a32398ecf33 |
|
VISUAL
aHash
|
7c04383c003c3c3c |
|
VISUAL
dHash
|
68d870708dede869 |
|
VISUAL
wHash
|
ff2c3c3c043c3c3c |
|
VISUAL
colorHash
|
382000080c1 |
|
VISUAL
cropResistant
|
3231b5b9d9c9c8c8,e8e06c531b1c2c2c,565c64545463cbd5,8ba9afdbd04c3e9a,68d870708dede869 |
• Threat: Phishing
• Target: Atletico Madrid fans, K8 users
• Method: Impersonation and enticing gambling offers
• Exfil: Unknown, likely harvesting user data or financial information.
• Indicators: Domain mismatch, gambling promotions, obfuscated code.
• Risk: High
The attackers are impersonating Atletico Madrid and K8 to lure victims. This involves creating a look-alike website using branding, logos and layout that mimics the legitimate entity.
Promoting gambling and bonus offers to entice users to provide their credentials or financial information.
Pages with identical visual appearance (based on perceptual hash)