Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13193B8B29251243320BFB1D5F1297709A2D3D74EC68287D1F2F8A36B1ED6CA1F817856 |
|
CONTENT
ssdeep
|
1536:OYMXWnSras7uOQHor8BPmzzXXMd6MiucCOK:BMXWds7uOTkmzzXXMd6M1cCOK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a41363933cccecd3 |
|
VISUAL
aHash
|
0000e3dbffffffc3 |
|
VISUAL
dHash
|
c8c8ae3638002606 |
|
VISUAL
wHash
|
000042c3dfffdfc3 |
|
VISUAL
colorHash
|
072000082c0 |
|
VISUAL
cropResistant
|
c8c8ae3638002606 |
โข Threat: Credential harvesting phishing kit
โข Target: Roblox users internationally
โข Method: Fake login form stealing user credentials
โข Exfil: Potential data exfiltration via obfuscated JavaScript
โข Indicators: Domain mismatch, country-code TLD, obfuscated JS
โข Risk: HIGH - Immediate credential theft
The phishing page presents a fake Roblox login form with 'Email' and 'Password' fields. Submitted credentials are intercepted in real-time and exfiltrated to an attacker-controlled server for immediate account takeover.
Additional forms or fields may be dynamically loaded to capture sensitive personal information, such as payment details or security questions, for further exploitation or identity theft.
Large obfuscated JavaScript file containing credential harvesting and data exfiltration logic.
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 1. INITIAL CONTACT โ
โ - Victim receives phishing link (email/message) โ
โ - Directed to fake Roblox login page โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 2. FAKE LOGIN PAGE โ
โ - Mimics legitimate Roblox interface โ
โ - Presents credential input form โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 3. CREDENTIAL SUBMISSION โ
โ - Victim enters username/password โ
โ - Form appears to process login โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 4. DATA EXFILTRATION โ
โ - Credentials sent via HTTP POST โ
โ - Data received by attacker-controlled server โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
```
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 1. INITIAL CONTACT โ
โ - Victim receives phishing link (email/message) โ
โ - Directed to fake Roblox login page โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 2. FAKE LOGIN PAGE โ
โ - Mimics legitimate Roblox interface โ
โ - Presents credential input form โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 3. CREDENTIAL SUBMISSION โ
โ - Victim enters username/password โ
โ - Form appears to process login โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 4. DATA EXFILTRATION โ
โ - Credentials sent via HTTP POST โ
โ - Data received by attacker-controlled server โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
```
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain