Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12A0274B28404542B121281C97667FB4E60839346CF761851A7D543AFBAEEAF0DCBB397 |
|
CONTENT
ssdeep
|
192:BSiS7oiwQcYIhFB+unhnzgJ3OUz3NXTX2a:BSiS7oiwQ8f9UOU3NXTXB |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f46d1319665e5313 |
|
VISUAL
aHash
|
00c3c3c3d3ffffe7 |
|
VISUAL
dHash
|
1616aaae16080e4d |
|
VISUAL
wHash
|
00c3c3c3c3c7cbe7 |
|
VISUAL
colorHash
|
06040006080 |
|
VISUAL
cropResistant
|
9616aaa616080e4d,0000343430303410 |
• Amenaza: Phishing
• Objetivo: Usuarios de DANA
• Método: Suplantación de identidad a través de una URL acortada, formularios y ofuscación de JavaScript
• Exfil: login.php (probablemente)
• Indicadores: Acortador de URL, Formularios, Ofuscación
• Riesgo: Alto
The site uses a shortened URL to mask the actual destination and tricks the user into entering their login credentials into the form, which will be sent to the malicious actor.
The site presents a page that seems legitimate at first glance to lure the user into the trap.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain