Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BD73867292102437617B79DAF064771AA2D3D74FCA8256E1A2F8939A0FD6CE1FC1740E |
|
CONTENT
ssdeep
|
1536:wryXWn9r8Wr+5kLweQSYuOLeXsJVZ57Hb7HD7H/7Hy7Hv7H37HE7H37Hn7HF7H3a:oyXW+WrrsJXuOfJ9777j7f7S7P7X7k70 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b4164363999cbcbc |
|
VISUAL
aHash
|
0000d3ffc3c3ffff |
|
VISUAL
dHash
|
e8ec3630161e0006 |
|
VISUAL
wHash
|
000093dfc3c3ffe3 |
|
VISUAL
colorHash
|
07000010080 |
|
VISUAL
cropResistant
|
e8ec3630161e0006 |
โข Threat: Credential harvesting phishing kit
โข Target: Roblox users
โข Method: Fake login form stealing user credentials
โข Exfil: Data sent to unknown server
โข Indicators: Domain mismatch, obfuscated JavaScript, unusual TLD
โข Risk: HIGH - Immediate credential theft
The phishing kit is designed to capture user credentials by presenting a fake Roblox login form. The form likely intercepts input in real-time and transmits it to a remote server controlled by the attacker.
The kit includes modules for stealing one-time passwords (OTPs) and payment card details, which are likely captured through fake verification or payment forms presented after initial credential theft.
Large JavaScript files containing obfuscated code likely used for credential harvesting and data exfiltration.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain