Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15EB1A513F34C2167079702FCFB6BA0E8C24B849CA29A9A04A1BC721E53D55CDC37E9D8 |
|
CONTENT
ssdeep
|
96:dQXpPG/R1/7SKc4t0wAdSnQ2+FYr5u7vQMuw4Sghzyb4/MRreZCm:dCpPG51js4t0wAfTFSaJe+bJeIm |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c16bd4906bd1947e |
|
VISUAL
aHash
|
7c000000007e7e7e |
|
VISUAL
dHash
|
d8c0c0c0d0d0dcc4 |
|
VISUAL
wHash
|
7e0000607e7e7e7e |
|
VISUAL
colorHash
|
3a000e00000 |
|
VISUAL
cropResistant
|
a280c1899dccc0a2,c03030d098383080,a2808ba3a3a7a781,d8c0c0c0d0d0dcc4 |
• Threat: Phishing
• Target: Ledger users
• Method: Impersonation through a look-alike website.
• Exfil: Unknown, likely credential harvesting and/or access to crypto wallets. fromCharCode is present.
• Indicators: Ledger logo on free hosting, attempts to mimic the Ledger Live interface.
• Risk: High
The attacker likely uses a convincing replica of the Ledger interface to trick users into entering their login credentials or seed phrases. These stolen credentials can then be used to access the victim's Ledger wallet.
The presence of obfuscation may indicate that the site could also inject malicious code to perform actions such as keylogging or redirecting users to fake URLs.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain