Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11181831241109C334983D5E426A5AB5B32888779C603590DF7F8876E2AE3CD8CF6B669 |
|
CONTENT
ssdeep
|
96:4S2sUjd42eUEz1YJNPDCZ49O3X9/GmLNmLc:jUEz1kNPDk49O3X9/r |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d2c433f758a678c4 |
|
VISUAL
aHash
|
6466666666666664 |
|
VISUAL
dHash
|
cccccccccccccccc |
|
VISUAL
wHash
|
6646467676666666 |
|
VISUAL
colorHash
|
07400038000 |
|
VISUAL
cropResistant
|
cccccccccccccccc,6460646464686460 |
โข Threat: Phishing
โข Target: Unspecified
โข Method: Obfuscation and fake content on free hosting.
โข Exfil: Telegram bot (8005531574:AAEfPknbFgolkF67VC1fSJUSD7LWnGZRUMA)
โข Indicators: Free hosting, brand logo on suspicious page, obfuscation.
โข Risk: High
The attacker uses a free hosting service to host a malicious page containing obfuscated code designed to steal information. The use of repeating 'FAKE' text and an overlayed logo is intended to distract the user.
The site likely uses JavaScript to collect user information and then exfiltrates it through a Telegram bot.
| ID | Portuguese | English | Trigger |
|---|---|---|---|
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain