Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13D13957154686933432B46DBF0B7AF1EB1D3C64CCA431891AAFC53ED0BDAC72EA46446 |
|
CONTENT
ssdeep
|
384:XjX5LthI6lNrBuNWcfaZMWEiNu7lnEF1/1g85cgX3JUhnTSMNo4FJPGN4pJNFN4e:XjX55hEWsAuyF9yi3X+hnNvPyzAdE4 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8c8d6ae283acb57a |
|
VISUAL
aHash
|
5b181a3b0ce2181c |
|
VISUAL
dHash
|
b3f332f2b88e3370 |
|
VISUAL
wHash
|
df191e7b0ce2183c |
|
VISUAL
colorHash
|
39401008040 |
|
VISUAL
cropResistant
|
b3f332f2b88e3370 |
โข Threat: Phishing
โข Target: Roblox users
โข Method: Impersonation via domain spoofing
โข Exfil: Likely steals login credentials
โข Indicators: Domain misspelling, forms detected, recent domain
โข Risk: HIGH
The attacker is attempting to steal user credentials by creating a fake login page that mimics the official Roblox login.
The attacker uses a similar-looking domain to trick users into thinking they are on the real Roblox website.
Functions: submitForm, sendData
User fills <input name=username> and <input name=password> โ submitForm() โ fetch('https://www.robloxt.co/login') โ credentials sent to phishing endpoint
User fills <input name=username> and <input name=password> โ submitForm() โ fetch('https://www.robloxt.co/login') โ credentials sent to phishing endpoint
4db2f741b7a3ec36d11fec999ce33f708ae85641cabfd27e11e0935928f7d9c4.jssubmitFormsendDataPages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain