Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T166A283387295567B31C795F2B7216B6D7298C24FC727DA88A3F8C28977DEC668C61300 |
|
CONTENT
ssdeep
|
384:OCsq6DsVBChUqLDOHfvm4tTig+4/2m2VVUrvA+QFXhkVDHV:Ot3mLHfvjsQjA+SXhktHV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fc3a6aa581e11f26 |
|
VISUAL
aHash
|
8f0181ffffe2e2f0 |
|
VISUAL
dHash
|
5f35159696568616 |
|
VISUAL
wHash
|
8f0101ffe3e2e0f8 |
|
VISUAL
colorHash
|
07006008000 |
|
VISUAL
cropResistant
|
ffffdde9f1f9dfff,ffffdde9f1f9ddff,5f35159696568616 |
• Amenaza: Phishing
• Objetivo: Usuarios de Binance
• Método: Impersonación de Binance Cloud Mining con un aviso de retiro falso.
• Exfil: Desconocido. Probablemente apunta a credenciales de pago o de cuenta
• Indicadores: Dominio no relacionado, urgencia, saldo falso.
• Riesgo: ALTO
The attackers are attempting to harvest user credentials by creating a convincing phishing page that looks like Binance. Users are tricked into entering their login details.
The site leverages social engineering techniques by creating a false sense of urgency and threatening account blockage.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain