Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11693B9B29251243320BFB1D5F1297709A2D3D74EC68287D1E2FCA36B1ED6CA1F817856 |
|
CONTENT
ssdeep
|
1536:uAEXWnSracJuOKRorHBPmzzXXMd6MiucCOK:vEXWdcJuOf5mzzXXMd6M1cCOK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec19669334cde592 |
|
VISUAL
aHash
|
0000fbdbffffffc3 |
|
VISUAL
dHash
|
f0e8963638002606 |
|
VISUAL
wHash
|
000042c3dfffdfc3 |
|
VISUAL
colorHash
|
072000082c0 |
|
VISUAL
cropResistant
|
f0e8963638002606 |
โข Threat: Impersonation
โข Target: Roblox users
โข Method: Typosquatting
โข Exfil: Potentially credentials or account information
โข Indicators: Typosquatted domain, similar visual layout
โข Risk: HIGH
The attacker likely aims to steal user credentials by mimicking the Roblox interface to capture login information if a fake login page is presented.
The presence of obfuscated javascript code can be a indicator of a attempt to inject malicious code to the user's computer.
0c2a7c793ed0761b93b214956992ffb44014abcb404fd8bd2f9a7eb32ea0a600.jsFound 10 other scans for this domain