Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16B52F946A3A7542F037383C6D6C74F35AFF6025AE8126B098ADFC70E17CCD16E192505 |
|
CONTENT
ssdeep
|
192:DlVgz4tL1TSv0aUnS6M8+x9g9/HOFBUeru:DQz4tL11aUnm79g9/HcUn |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ce9ae4e46534649b |
|
VISUAL
aHash
|
ff3c3c0038181818 |
|
VISUAL
dHash
|
a669696061616161 |
|
VISUAL
wHash
|
fffc3c003c383c38 |
|
VISUAL
colorHash
|
30403000040 |
|
VISUAL
cropResistant
|
f0f0d29696f0f0f0,a669696061616161 |
• Threat: Phishing/Credential Harvesting
• Target: Galabet Users
• Method: Domain squatting and brand impersonation
• Exfil: Unknown
• Indicators: New domain, obfuscated code
• Risk: High
The site acts as a gateway to redirect users to the latest 'live' domain of a gambling platform, often used to capture traffic or spoof login portals.
Uses affiliate/referral links to generate revenue while impersonating the target brand.