Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T171A131E23899593E33F346DAF0A2975830CA9599C441B409D69517FD07D8EA2ECCE31F |
|
CONTENT
ssdeep
|
96:M6aVeiWnXI0wVWdAXH2k8lcC3rIjfeb1GmcoGkGcGBavG61GEOG0K1GY4tVM1GYN:JXsWd4HLscC51GmVGkGcGO1GEOGN1GYh |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b326790cd986f326 |
|
VISUAL
aHash
|
000000ffffffffff |
|
VISUAL
dHash
|
8c2849320c10041b |
|
VISUAL
wHash
|
000000fffcfce1ff |
|
VISUAL
colorHash
|
07e00000000 |
|
VISUAL
cropResistant
|
8c2849320c10041b |
• Amenaza: Phishing
• Objetivo: Usuarios de Mercado Libre
• Método: Impersonación a través de un formulario de inicio de sesión en un subdominio inesperado
• Exfil: Desconocido
• Indicadores: Subdominio, formulario de inicio de sesión.
• Riesgo: Alto
The attacker aims to steal user credentials by presenting a login form on a page that is supposed to be unrelated to the login process. The user, believing it's a genuine login prompt, enters their credentials, which are then captured by the attacker.
melidata.min.jsPages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain