Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T109A254329141AA730157E2D4B2759B6F3A8287C9CA4307A1A3F8975D9FCBCF9DE11308 |
|
CONTENT
ssdeep
|
384:D44785ad9ZlRqRERqRkdBAZEjrERfA8IDtRySeeLe8ieAPK+iyGRi:D44Qad9ZlEGE2dBAZEnERo8IDtISeeLO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b2246dcdcf3232b2 |
|
VISUAL
aHash
|
c3c3c7ff7f6f7f7f |
|
VISUAL
dHash
|
869e9d5d79595959 |
|
VISUAL
wHash
|
83c3c73c3c3c3c3c |
|
VISUAL
colorHash
|
06c00008000 |
|
VISUAL
cropResistant
|
869e9d5d79595959,0000000000000000,a329f5b636f5340d |
โข Threat: Phishing
โข Target: WhatsApp users
โข Method: Impersonation via fake promotion
โข Exfil: Unknown, likely aiming to steal user data with the CODE PIN request.
โข Indicators: Unusual domain, lottery claims, CODE PIN request
โข Risk: HIGH
The site uses the WhatsApp brand and logo to trick users into believing a fake lottery is legitimate, with the goal of obtaining sensitive data or installing malware. This is a common social engineering tactic.
The site uses promises of prizes and rewards ('undian') to create a sense of urgency and excitement, encouraging users to take actions that they normally wouldn't.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain