Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18141F0F2C289A63322528AC6FE70B739F5D3018EF8411653C6F116FD03C9EB9D442A5A |
|
CONTENT
ssdeep
|
48:epWxqnmsQ2HwvlFx6mH07m7roj7ao77ro6:hsAvlj687cnd/c6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cfb333c73031c698 |
|
VISUAL
aHash
|
ef3c1c003c7c3000 |
|
VISUAL
dHash
|
4969792af165600a |
|
VISUAL
wHash
|
ff3c3c307c7c3c00 |
|
VISUAL
colorHash
|
00000000e00 |
|
VISUAL
cropResistant
|
3232b232b6323232,9c7c424c7e480c1e,4969792af165600a |
• Amenaza: Suplantación de identidad
• Objetivo: usuarios de bet365
• Método: Suplantación de dominio y tácticas de urgencia.
• Exfil: Desconocido (probablemente datos como inicios de sesión)
• Indicadores: Discordancia de dominio, mensaje urgente sobre la expiración, document.write
• Riesgo: ALTO
The attacker aims to trick users into entering their bet365 login credentials by directing them to a fake website that mimics the legitimate site. Once credentials are provided, they are harvested by the attackers.
Malicious Javascript (document.write) could be used to redirect users or install malicious files.
Pages with identical visual appearance (based on perceptual hash)