Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B411CE6040809C7BE243D1F417A1E30536C5CA57CA0716006FF8D79C6BE7D6ADD45C91 |
|
CONTENT
ssdeep
|
12:nwMy7FUPDWYN/s6wlAaItl7MBqNct/+SshOgNQHZo3f68GHFf3oJDwxIK4S:n/CM3N/owiBGrfhOgN1TOwNwmS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
999999cd64666666 |
|
VISUAL
aHash
|
3c3c000000000000 |
|
VISUAL
dHash
|
70704c3004000000 |
|
VISUAL
wHash
|
fcfce4fc00000000 |
|
VISUAL
colorHash
|
07000000038 |
|
VISUAL
cropResistant
|
70704c3004000000 |
• Amenaza: Phishing
• Objetivo: Usuarios no especificados
• Método: Recopilación de credenciales
• Exfil: Telegram
• Indicadores: Dominio sospechoso, formulario de inicio de sesión genérico, token de Telegram, ofuscación.
• Riesgo: Alto
The site uses a fake login form to steal user credentials (email and password). The entered information is likely sent to a remote server controlled by the attacker.
The attacker uses a Telegram bot to collect the stolen credentials.
| ID | Portugués | Inglés | Trigger |
|---|---|---|---|
Pages with identical visual appearance (based on perceptual hash)