Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1712186A364002C2CBA3182248FD3F84943E4B4A5C4282C90F8CD74AE5DE4FF2A887236 |
|
CONTENT
ssdeep
|
24:SqOupUEcsE9cQ6YvmLoAdMA7EazSdhFu7WHAjKQvdHYHFj:+upUdf9cQXiuAR8hRAx+H1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8f0f0f0f0f0f0f0e |
|
VISUAL
aHash
|
1fffffffffffffff |
|
VISUAL
dHash
|
6000000000000000 |
|
VISUAL
wHash
|
10f0f0f0f0f0f0f0 |
|
VISUAL
colorHash
|
07000000000 |
|
VISUAL
cropResistant
|
6000000000000000 |
The phishing kit is designed to capture login credentials by presenting a fake authentication interface. The kit likely intercepts user input in real-time and transmits it to a remote server controlled by the attacker.
The kit includes functionality to capture one-time passwords (OTPs) or two-factor authentication (2FA) codes, enabling attackers to bypass additional security layers and gain unauthorized access to victim accounts.
Highly obfuscated JavaScript file with no identifiable legitimate functionality.
Here's a generic ASCII art attack flow diagram for your phishing scenario:
```
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 1. VICTIM RECEIVES DECEPTIVE MESSAGE โ
โ - Email/SMS with link to fake Banking site โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 2. FAKE SITE DISPLAYED โ
โ - Victim lands on credential harvesting page โ
โ - Page mimics legitimate Banking interface โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 3. CREDENTIALS ENTERED โ
โ - Victim inputs Banking credentials โ
โ - Form appears identical to real login โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 4. DATA CAPTURED โ
โ - Credentials collected via form submission โ
โ - Sent via HTTP POST to attacker-controlled server โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
```
Here's a generic ASCII art attack flow diagram for your phishing scenario:
```
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 1. VICTIM RECEIVES DECEPTIVE MESSAGE โ
โ - Email/SMS with link to fake Banking site โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 2. FAKE SITE DISPLAYED โ
โ - Victim lands on credential harvesting page โ
โ - Page mimics legitimate Banking interface โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 3. CREDENTIALS ENTERED โ
โ - Victim inputs Banking credentials โ
โ - Form appears identical to real login โ
โโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ 4. DATA CAPTURED โ
โ - Credentials collected via form submission โ
โ - Sent via HTTP POST to attacker-controlled server โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
```
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain