Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CE33736052335A6B02A383C1E6B69F9DD1C08350D3674A69F3FC876FAECEC44BD55262 |
|
CONTENT
ssdeep
|
768:F4gWt4ohY+lK02WOm0413MC0hsC63SQ4edF:Obt4ohY+lK02WOmK6iQ4edF |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bad74d2c119586d5 |
|
VISUAL
aHash
|
02a4fe4cc5818100 |
|
VISUAL
dHash
|
36494c9919252711 |
|
VISUAL
wHash
|
02f5fecfcd878101 |
|
VISUAL
colorHash
|
300000084c0 |
|
VISUAL
cropResistant
|
36494c9919252711 |
• Amenaza: Phishing
• Objetivo: Usuarios de Crypto/Web3
• Método: Suplantación de identidad de plataforma Web3
• Exfil: Potencialmente robando credenciales/información de billetera a través de JavaScript.
• Indicadores: Dominio nuevo, JavaScript ofuscado y solicitud para conectar billetera.
• Riesgo: Alto
The site likely attempts to steal login credentials, potentially for a crypto wallet or exchange, through a fake login page or by prompting to connect a wallet.
Malicious JavaScript code, possibly hidden in the obfuscated code, could be designed to drain the connected wallet of funds once connected.
Pages with identical visual appearance (based on perceptual hash)