Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F8628331F075643B011F75E0F1A6970AE2DBC30ECBA28BE4E6B892E057D9CD5AD27605 |
|
CONTENT
ssdeep
|
192:U1Yk8D/ojEvQtJVVvmdiAjtyTfpOgsKbeJOdtAojtIv1+25MqfYcJXE4vrz12eho:bwjwiJwhytbRbeJ4fE1tNJ1wNV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9959a42766dc9936 |
|
VISUAL
aHash
|
18181818251f1f3f |
|
VISUAL
dHash
|
d1b2303169707474 |
|
VISUAL
wHash
|
3d181818271f1fbf |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
d1b2303169707474 |
The phishing kit is designed to capture user credentials through form submissions. The kit likely intercepts input fields in real-time or upon submission, exfiltrating data to a remote server controlled by the attacker.
Secondary attack vectors include stealing one-time passwords (OTPs) and payment card details. This suggests the kit may dynamically present OTP or card input fields based on user interaction or pre-defined triggers.
Bundled JavaScript file containing obfuscated code for credential harvesting and data exfiltration.
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 1. TARGET RECEIVES DECEPTIVE MESSAGE โ
โ - Victim directed to fake Banking site โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 2. FAKE SITE DISPLAYED โ
โ - Mimics legitimate Banking interface โ
โ - Presents credential input form โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 3. CREDENTIALS ENTERED โ
โ - Victim submits login details โ
โ - Form appears to process normally โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 4. DATA CAPTURED โ
โ - Credentials collected by attacker โ
โ - Submitted via standard HTTP POST โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
```
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 1. TARGET RECEIVES DECEPTIVE MESSAGE โ
โ - Victim directed to fake Banking site โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 2. FAKE SITE DISPLAYED โ
โ - Mimics legitimate Banking interface โ
โ - Presents credential input form โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 3. CREDENTIALS ENTERED โ
โ - Victim submits login details โ
โ - Form appears to process normally โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 4. DATA CAPTURED โ
โ - Credentials collected by attacker โ
โ - Submitted via standard HTTP POST โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
```
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain