Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19CE2CB65A20151A302B3CEC7D6717F3E729BF30F85069780BAAA61941FFBC76B5214B4 |
|
CONTENT
ssdeep
|
192:6NsR1CfDDqFPDVjF+dCWPp4iT7M+Su+GQsTeGRpg8WbD3RUNuNTjg6gf/Vi7hpga:SII4iT7MySNREE7 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cc98994ee6663366 |
|
VISUAL
aHash
|
18181810381818ff |
|
VISUAL
dHash
|
32b232a02022a2a2 |
|
VISUAL
wHash
|
383c18383c3c3cff |
|
VISUAL
colorHash
|
380000001c0 |
|
VISUAL
cropResistant
|
32b232a02022a2a2 |
โข Threat: Impersonation
โข Target: Coinbase users
โข Method: Domain spoofing and visual mimicry
โข Exfil: Unknown (potentially through intercepted WebSocket traffic)
โข Indicators: Domain mismatch, brand impersonation, JavaScript obfuscation
โข Risk: High
The site attempts to phish for credentials by imitating the Coinbase website/app. Users may be prompted to enter their login details or other sensitive information.
Obfuscated Javascript might be used to monitor user actions, scrape data, or redirect to further phishing sites. WebSocket usage suggests the potential of live data streaming for exfiltration.
Pages with identical visual appearance (based on perceptual hash)