Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T109A254329141AA730157E2D4B2759B6F3A8287C9CA4307A1A3F8975D9FCBCF9DE11308 |
|
CONTENT
ssdeep
|
384:D44785ad9ZlRqRERqRkdBAZEjrERfA8IDtRySeeLe8ieAPK+iyGRi:D44Qad9ZlEGE2dBAZEnERo8IDtISeeLO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b2246dcdcf3232b2 |
|
VISUAL
aHash
|
c3c3c7ff7f6f7f7f |
|
VISUAL
dHash
|
869e9d5d79595959 |
|
VISUAL
wHash
|
83c3c73c3c3c3c3c |
|
VISUAL
colorHash
|
06c00008000 |
|
VISUAL
cropResistant
|
869e9d5d79595959,0000000000000000,a329f5b636f5340d |
• Amenaza: Phishing
• Objetivo: Usuarios de WhatsApp
• Método: Suplantación de identidad a través de una promoción falsa
• Exfil: Desconocido, probablemente con el objetivo de robar datos del usuario con la solicitud de CODE PIN.
• Indicadores: Dominio inusual, afirmaciones de lotería, solicitud de CODE PIN
• Riesgo: ALTO
The site uses the WhatsApp brand and logo to trick users into believing a fake lottery is legitimate, with the goal of obtaining sensitive data or installing malware. This is a common social engineering tactic.
The site uses promises of prizes and rewards ('undian') to create a sense of urgency and excitement, encouraging users to take actions that they normally wouldn't.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain