Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12E222233B600CD2A4DAB559CF2C09649451EC346FB3148CAB1A091FFBBC0DF065A97AE |
|
CONTENT
ssdeep
|
192:aAkHzzYcLcYchro/y4RGJaiMcnthWeNWbZfMmUU8VCo9H:5cLcYchrEy4QETfMmUFCop |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b13133cececec688 |
|
VISUAL
aHash
|
c3c3c3ffffffffff |
|
VISUAL
dHash
|
0c9e960c30000001 |
|
VISUAL
wHash
|
0000000400000303 |
|
VISUAL
colorHash
|
07000000000 |
|
VISUAL
cropResistant
|
0c9e960c30000001,0000000000000000,8000000000000000,61217e726e72314d |
• Amenaza: Phishing de credenciales
• Objetivo: Usuarios de Twin Valley
• Método: Impersonación a través de un formulario de inicio de sesión en Framer.app.
• Exfil: Potencialmente a través de ofuscación JavaScript.
• Indicadores: Alojamiento en Framer.app, formulario de inicio de sesión.
• Riesgo: Alto
The attacker is attempting to steal user credentials by mimicking the Twin Valley login page on Framer.app and presenting an email/password form.
JavaScript code has been obfuscated to hide its intent. This might involve data exfiltration or other malicious activities.
Pages with identical visual appearance (based on perceptual hash)