Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1282371F19240A9AF8561C2DED3737FC8D7C2508AE7928C85E9A4971D09C9C93DD172BC |
|
CONTENT
ssdeep
|
768:n7HZ6DfXLnQVTwBa4AVYG1umlo8xa/CRz:nrZCfawRG1umloez |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cdb0b2b3c5ce4d0c |
|
VISUAL
aHash
|
ffff103010383030 |
|
VISUAL
dHash
|
0034726272626262 |
|
VISUAL
wHash
|
ffff303038383838 |
|
VISUAL
colorHash
|
031c0000000 |
|
VISUAL
cropResistant
|
0034726272626262 |
• Amenaza: Phishing
• Objetivo: Usuarios de Yahoo
• Método: Recopilación de credenciales a través de un formulario de inicio de sesión falso
• Exfil: http://free.mailjol.net/allforms.php
• Indicadores: Dominio, Obfuscación, envío de formulario JavaScript.
• Riesgo: Alto
The site attempts to steal Yahoo user credentials by displaying what *appears* to be a Yahoo login form. Users enter their credentials, which are then sent to a malicious server.
The website employs Javascript obfuscation to conceal the phishing activities from detection.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain