Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T177A221B7600CCE3D4A5AE1D87EA776BCD153A20AF9D5189AF1C90B6B4742F748D2301B |
|
CONTENT
ssdeep
|
384:i2nRarJSnx/pGsSX+safOZM9ScPVjJqko9UtzweL3aL4xpgE:dnRCJSnx/GXNAOC9ScPVjJqkodkTxr |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b131cecececc2433 |
|
VISUAL
aHash
|
ffcfc7c7c7c3ffff |
|
VISUAL
dHash
|
209a9e9e9e9e600e |
|
VISUAL
wHash
|
0303070303030303 |
|
VISUAL
colorHash
|
074010000c0 |
|
VISUAL
cropResistant
|
209a9e9e9e9e600e,8f839eb6a8a1898b |
The phishing kit is designed to capture Instagram login credentials by presenting a fake login form. The harvested credentials are likely exfiltrated in real-time to an attacker-controlled server for immediate account takeover.
The kit includes functionality to intercept one-time passwords (OTPs) sent via SMS or authenticator apps, enabling bypass of two-factor authentication (2FA) protections.
Obfuscated JavaScript file with no legitimate functionality detected, likely used for credential harvesting and OTP interception.
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain