Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17413967164682933431B46DBF0B7AF1EB1D3C64CCA431891AAFC53ED0BDAC72EA46546 |
|
CONTENT
ssdeep
|
384:XjX5LthI6lNrBuvW5faZMWEiNu7lnEF1/1g85cgX3JUhnTSMNo4QJPGN4UJNFN4e:XjX55haWHAuyF9yi3X+hn6QPyzAdE4 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8c8d6ae283acb57a |
|
VISUAL
aHash
|
5b181a3b0ce2181c |
|
VISUAL
dHash
|
b3f332f2b88e3370 |
|
VISUAL
wHash
|
df191e7b0ce2183c |
|
VISUAL
colorHash
|
39401008040 |
|
VISUAL
cropResistant
|
b3f332f2b88e3370 |
โข Threat: Credential Phishing
โข Target: Roblox users
โข Method: Impersonation of Roblox login page
โข Exfil: wss://${wsHost}/ws?token=${wsToken} (potential for data exfiltration)
โข Indicators: Domain mismatch, form submission, JavaScript obfuscation
โข Risk: HIGH
The site mimics the Roblox login page to trick users into entering their usernames/emails and passwords. These credentials are then harvested by the attackers.
The use of 'atob', 'eval', and 'fromCharCode' to obfuscate the JavaScript code, hides malicious functions that could be used for data exfiltration.
Functions: sendData(), submitForm()
User fills <input name='username'> โ submitForm() โ fetch('https://robloxr.com.es/login') โ credentials sent to phishing endpoint
User fills <input name='username'> โ submitForm() โ fetch('https://robloxr.com.es/login') โ credentials sent to phishing endpoint
4db2f741b7a3ec36d11fec999ce33f708ae85641cabfd27e11e0935928f7d9c4.jssendData()submitForm()Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain