Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E7B1EF62D480EC271622CBC0B11167BAE48B416EDF1B1C52D5F40FAAF7A4C64C95EADE |
|
CONTENT
ssdeep
|
48:T4phY9YcTHF4CU4kGtjtw5onZo4GDH3ChDHRjDHWf6DHGhDH3G25KGADAzCDQfoQ:TgOPftjWl4SOVBEmD01mPBFH0/F0/SX |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
92699a32398ecf33 |
|
VISUAL
aHash
|
7c04383c003c3c3c |
|
VISUAL
dHash
|
68d870708dede869 |
|
VISUAL
wHash
|
ff2c3c3c043c3c3c |
|
VISUAL
colorHash
|
382000080c1 |
|
VISUAL
cropResistant
|
3231b5b9d9c9c8c8,e8e06c531b1c2c2c,565c64545463cbd5,8ba9afdbd04c3e9a,68d870708dede869 |
• Amenaza: Phishing
• Objetivo: Aficionados del Atlético de Madrid, usuarios de K8
• Método: Suplantación y ofertas de juego atractivas
• Exfil: Desconocido, probablemente recopilación de datos de usuario o información financiera.
• Indicadores: Coincidencia de dominio, promociones de juego, código ofuscado.
• Riesgo: Alto
The attackers are impersonating Atletico Madrid and K8 to lure victims. This involves creating a look-alike website using branding, logos and layout that mimics the legitimate entity.
Promoting gambling and bonus offers to entice users to provide their credentials or financial information.
Pages with identical visual appearance (based on perceptual hash)