Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18B417BB28045DB639283A1E0DB76271BB3C1C645CE5B0B0166F893EE5FDBD94CD1B012 |
|
CONTENT
ssdeep
|
24:2OSNEKUcDPiQ+NB8EYCQp26BS9Fp26BS0d/p26BNLu5h9y6Tt/11Zixm:dSVhDKNrFQLBuFLBTRLBdu/86T/1Um |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e3ce1893639964ce |
|
VISUAL
aHash
|
e7e7e7e7e3c3c7c3 |
|
VISUAL
dHash
|
0e0e0c0e0e9e9e96 |
|
VISUAL
wHash
|
c3c3c3c3c3c3c3c3 |
|
VISUAL
colorHash
|
07018000200 |
|
VISUAL
cropResistant
|
0e0e0c0e0e9e9e96,2d242034bececfcf |
β’ Threat: Brand impersonation phishing
β’ Target: bet365 users
β’ Method: Fake registration page mimicking bet365 branding
β’ Exfil: Potential data exfiltration via obfuscated JavaScript
β’ Indicators: Domain mismatch, recent domain registration, unrelated TLD
β’ Risk: HIGH - Potential for credential theft and financial fraud
The phishing kit employs a credential harvester to capture usernames, passwords, and other sensitive account details entered by victims. Data is likely exfiltrated in real-time to an attacker-controlled server for immediate use in account takeover or financial fraud.
The OTP Stealer kit intercepts one-time passwords (OTPs) or two-factor authentication (2FA) codes, enabling attackers to bypass additional security layers and gain unauthorized access to victim accounts.
Highly obfuscated JavaScript file likely containing credential harvesting and OTP interception logic.
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 1. VICTIM RECEIVES PHISHING LURE β
β - Fake bet365 email/link directs to malicious site β
ββββββββββββββββββββββ¬ββββββββββββββββββββββββββββββββββββββ
β
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 2. FAKE LOGIN PAGE DISPLAYED β
β - Victim sees cloned bet365 login interface β
ββββββββββββββββββββββ¬ββββββββββββββββββββββββββββββββββββββ
β
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 3. CREDENTIALS ENTERED β
β - Victim inputs Banking credentials β
β - Form appears identical to legitimate site β
ββββββββββββββββββββββ¬ββββββββββββββββββββββββββββββββββββββ
β
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 4. DATA COLLECTION β
β - Credentials captured by attacker's server β
ββββββββββββββββββββββ¬ββββββββββββββββββββββββββββββββββββββ
β
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 5. EXFILTRATION VIA HTTP POST β
β - Stolen credentials sent via standard form submissionβ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
```
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 1. VICTIM RECEIVES PHISHING LURE β
β - Fake bet365 email/link directs to malicious site β
ββββββββββββββββββββββ¬ββββββββββββββββββββββββββββββββββββββ
β
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 2. FAKE LOGIN PAGE DISPLAYED β
β - Victim sees cloned bet365 login interface β
ββββββββββββββββββββββ¬ββββββββββββββββββββββββββββββββββββββ
β
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 3. CREDENTIALS ENTERED β
β - Victim inputs Banking credentials β
β - Form appears identical to legitimate site β
ββββββββββββββββββββββ¬ββββββββββββββββββββββββββββββββββββββ
β
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 4. DATA COLLECTION β
β - Credentials captured by attacker's server β
ββββββββββββββββββββββ¬ββββββββββββββββββββββββββββββββββββββ
β
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 5. EXFILTRATION VIA HTTP POST β
β - Stolen credentials sent via standard form submissionβ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
```
Pages with identical visual appearance (based on perceptual hash)