Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E2C2DF31F20271071673F9C8F8613F0FB2A6B70B820295586A6945E47DCBCF6B7929B5 |
|
CONTENT
ssdeep
|
384:KF1tF3F2F2FwFhFsF+FfTEFwuS9EXbtMcgQgzT1g9U:K71iiwTk6fTEFwuS9EXbtMcgQgzT1gO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b333338ccccccccc |
|
VISUAL
aHash
|
e7c3c3ffffffffff |
|
VISUAL
dHash
|
4d4d4d041c14141c |
|
VISUAL
wHash
|
c0c0c0e4c3c3c3c3 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
4d4d4d041c14141c,e38f8dceefefaf2e |
• Threat: Cryptocurrency platform phishing
• Target: Users of Gemini Pro or other cryptocurrency platforms
• Method: Imitates a cryptocurrency trading app interface to collect user data or credentials
• Exfil: Data potentially exfiltrated via WebSocket URLs, JavaScript form submission and possibly custom API
• Indicators: Recently created domain, obfuscated JavaScript, WebSocket communication, JavaScript form submission.
• Risk: HIGH - Potential for theft of cryptocurrency or personal information
Pages with identical visual appearance (based on perceptual hash)