Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T188313074926098264182538A3FF1674AB3828346EB161E4436FA87AD1EF9E5ACC1A4A5 |
|
CONTENT
ssdeep
|
24:hRfCLBADenvFZoZJjiMfpRhfl7Xo3VfVXuOvWhwa:TgBIenvEZViMfdftCtXeh1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
aad7f0a846e303f2 |
|
VISUAL
aHash
|
b69e2c3c1101c301 |
|
VISUAL
dHash
|
54346869235b9717 |
|
VISUAL
wHash
|
befe3c3d1123c301 |
|
VISUAL
colorHash
|
30000e00000 |
|
VISUAL
cropResistant
|
fbb7ec9974ecd0a0,a2809acccc8c80aa,54346869235b9717 |
• Threat: Phishing
• Target: Ledger users
• Method: Impersonation through a look-alike website.
• Exfil: Likely steals credentials and/or attempts to install malware.
• Indicators: Free hosting, brand logo, obfuscated JavaScript, form submission.
• Risk: High
The attacker aims to steal user credentials by creating a website that mimics the legitimate Ledger website. This allows them to collect login details for the actual Ledger service.
The site might attempt to redirect the user to a malicious download that installs malware to steal crypto.
Found 3 other scans for this domain