Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T158535CE43640AD3AA87786D6E09A3619337D630BB80C45B0F27CD9D236A0C59F467FD8 |
|
CONTENT
ssdeep
|
768:0LD1pxv7TT8kNBpHzrLkowiym+b+TeTDUV7W+dIFHgrKdrKdrKdrKtJGrTP+Q4c2:sMqcnde//dQ2 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b0cdcd3239cc33c9 |
|
VISUAL
aHash
|
ffffdf87c787d7ff |
|
VISUAL
dHash
|
2b26362f1d0d2430 |
|
VISUAL
wHash
|
fb8181838787879f |
|
VISUAL
colorHash
|
06007000000 |
|
VISUAL
cropResistant
|
2b26362f1d0d2430,636c2e2705489891 |
• Amenaza: Phishing
• Objetivo: Usuarios de Instagram
• Método: Suplantación de identidad utilizando alojamiento gratuito
• Exfil: Desconocido
• Indicadores: Alojamiento gratuito, logotipo de la marca, ofuscación
• Riesgo: Alto
The attacker likely aims to steal Instagram login credentials through a fake login page. The user is tricked into entering their username and password, which the attacker then captures.
Functions: submitForm, sendData
User fills <input name='username'> and <input name='password'> → submitForm() → fetch('/api/submit') → credentials sent to endpoint
User fills <input name='username'> and <input name='password'> → submitForm() → fetch('/api/submit') → credentials sent to endpoint
_next/static/chunks/pages/index-8c9b756d0b1a4a46.jssubmitFormsendDataFound 1 other scan for this domain