Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13EE239B4A230D335B2C24BD8DA6425687A5FE1DCD7C695B0E388AF15B0D6CECD5260CB |
|
CONTENT
ssdeep
|
384:4r/aMJguWTFRhiXkdvNTDhPhLxeAxeDWNW1Tp34PxeeJEmuW3As+TERWUMd:4r/aMJguihhPhleMeDGCSPxeeWmH1W |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c0303f9f4fbc6849 |
|
VISUAL
aHash
|
8066e2e070fe7f20 |
|
VISUAL
dHash
|
7cdc8aabcbccecc1 |
|
VISUAL
wHash
|
8066e66078fe7f60 |
|
VISUAL
colorHash
|
30000000030 |
|
VISUAL
cropResistant
|
7cdc8aabcbccecc1 |
• Threat: Phishing
• Target: Gambling platform users
• Method: Impersonation and credential harvesting
• Exfil: wss://gambler-work.com/api/ws
• Indicators: Recent domain, form with password, JavaScript obfuscation, free reward claim.
• Risk: High
The site uses a form to collect email and password information, likely to steal credentials and gain access to user accounts or resell this information.
The site uses design elements to impersonate a gambling platform, and entice users to enter their credentials for a free reward
Pages with identical visual appearance (based on perceptual hash)