Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10741007140047C3F5583A7D8DB75A78AF3DAC202CE67160252FDD34D0ED6D46CCA9998 |
|
CONTENT
ssdeep
|
48:RGkvGcC97INc9JcBfosio88anYBqOBs4adBadxf2:RBGb9sNgJcfG7d++dwdxf2 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3e2cc1d76e21919 |
|
VISUAL
aHash
|
ffffffe70000ffff |
|
VISUAL
dHash
|
94294c0d08180008 |
|
VISUAL
wHash
|
70e6e4e40000ffff |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
8c102848304d4d30,0000000000000000,00100c32b2b20c20,08831a1a1a180800 |
• Amenaza: Phishing
• Objetivo: Clientes de DKB
• Método: Recopilación de credenciales
• Exfil: ./Asstes/php/config/func.php
• Indicadores: Discordancia de dominio, acción de formulario sospechosa, ofuscación.
• Riesgo: Alto
The attacker attempts to steal the victim's credentials by presenting a fake login form that mimics the appearance of the DKB bank's login page.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain