Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19593B8B29251243320BFB1D5F1297709A2D3D74EC68287D1E2FCA36B1ED6CA1F817856 |
|
CONTENT
ssdeep
|
1536:u8QXWnSravouOssorJBPmzzXXMd6MiucCOK:1QXWdvouOOTmzzXXMd6M1cCOK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b31363936ccccc9c |
|
VISUAL
aHash
|
0000e3dbffffffc3 |
|
VISUAL
dHash
|
c8c80e3638002606 |
|
VISUAL
wHash
|
000042c3dfffdfc3 |
|
VISUAL
colorHash
|
07200008280 |
|
VISUAL
cropResistant
|
c8c80e3638002606,46c6073f5d2d33f1 |
โข Threat: None detected.
โข Target: N/A
โข Method: N/A
โข Exfil: N/A
โข Indicators: The domain is robloxc.com.es which is not roblox.com
โข Risk: LOW - Potentially a data harvesting attempt, but no clear evidence of malicious activity in the screenshot.
The phishing kit employs a credential harvester to capture Roblox usernames and passwords in real-time. Submitted credentials are likely exfiltrated to a remote server controlled by the attacker for immediate account takeover.
The kit includes modules for intercepting one-time passwords (OTP) and stealing payment card details. This enables attackers to bypass multi-factor authentication and conduct unauthorized transactions.
Large JavaScript payload containing credential harvesting, OTP interception, and payment card stealing functionality.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain