Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14C73867292502437617B79DAF164771AA2D3D70FCA8246E1A2F8939A0FD6CE1FC1740E |
|
CONTENT
ssdeep
|
1536:28zXWn9rA4E+bpr2lflYuOWkwTZ57Hb7HD7H/7Hy7Hv7H37HE7H37Hn7HF7H37Hl:1zXWq4EeiRGuO4777j7f7S7P7X7k7X77 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b4164371999cecec |
|
VISUAL
aHash
|
0000d3ffc3c3ffff |
|
VISUAL
dHash
|
c8c82630161e0006 |
|
VISUAL
wHash
|
0000c3dfc3c3ffe3 |
|
VISUAL
colorHash
|
07003008040 |
|
VISUAL
cropResistant
|
c8c82630161e0006 |
โข Threat: Phishing
โข Target: Roblox users
โข Method: Domain spoofing and JavaScript obfuscation to capture credentials.
โข Exfil: Unknown
โข Indicators: Suspicious domain, obfuscation, brand impersonation
โข Risk: HIGH
The attacker aims to steal user credentials by creating a fake Roblox login or profile page. The obfuscated Javascript may assist in this.
User fills <input name='username'> โ sendData() โ fetch('https://accountsettings.roblox.com') โ credentials sent to server
User fills <input name='username'> โ sendData() โ fetch('https://accountsettings.roblox.com') โ credentials sent to server
EnvironmentUrls.jssendData()submitForm()roblox_user_id
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain