Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17282873462D2167F318745B7F321AF55A2A8C64BC72BEA88B3F4C14B73DEC664996340 |
|
CONTENT
ssdeep
|
192:OcZh1qLwMTvX7LnfXCk4OUruGAk0Oy0H+HlKsXAbbSz/S9VVP0pIa8DHzpC4:OChqtvX/VVUrvArFXhkVDHV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b7e2cc1dc01d8dc6 |
|
VISUAL
aHash
|
ffe7e7e7e78181ff |
|
VISUAL
dHash
|
4d4d4dcc4d0b0b8c |
|
VISUAL
wHash
|
e7e7e7e7000000ff |
|
VISUAL
colorHash
|
0f000038000 |
|
VISUAL
cropResistant
|
4d4d4dcc4d0b0b8c,e8c6a3a9b5b34ea8,a282754d6d6592a2,8e8e8e8e0c0fab9b |
• Threat: Phishing
• Target: Binance Pool users
• Method: Credential harvesting
• Exfil: Unknown (ID and password)
• Indicators: Suspicious domain, prompts for credentials.
• Risk: High
The attacker attempts to steal user credentials by mimicking a login page and prompting the user to enter their ID and set a new password.
Found 3 other scans for this domain