Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19273867292502437617B79DAF064B71AA2D3D74FCA8246E1A2F8939A0FD6CD1FC1340E |
|
CONTENT
ssdeep
|
1536:Tx6XWn9rU7S+71twe1JYuOciOnZ57Hb7HD7H/7Hy7Hv7H37HE7H37Hn7HF7H37Hp:d6XWu7ScqmSuOCH777j7f7S7P7X7k7Xj |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b4164363999cbcbc |
|
VISUAL
aHash
|
0000d3ffc3c3ffff |
|
VISUAL
dHash
|
e8e83630161e0006 |
|
VISUAL
wHash
|
0000c3dfc3c3ffe3 |
|
VISUAL
colorHash
|
07400010080 |
|
VISUAL
cropResistant
|
e8e83630161e0006 |
• Threat: Credential harvesting phishing kit
• Target: Roblox users
• Method: Fake login form stealing email and password
• Exfil: Data sent via JavaScript form submission
• Indicators: Suspicious TLD, domain mismatch, obfuscated JavaScript
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain