Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D7F37DF5325CB3B3165303E66076110732BA207FB9068D60E3D4DECAA7BACD9942BD95 |
|
CONTENT
ssdeep
|
1536:OOY/1RY/1e03hUR/+HALGqqLii6b1hJElUuRNka2wblHbJLwLIz9GguGOjjRnY:8bD8rX2wd9W/guGO+ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b1644c9b9bcc3371 |
|
VISUAL
aHash
|
98c0c3ffe7efffc3 |
|
VISUAL
dHash
|
299696e4cdcd372b |
|
VISUAL
wHash
|
000042e7e7effbc3 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
299696e4cdcd372b |
• Amenaza: Phishing
• Objetivo: Usuarios de billeteras de criptomonedas
• Método: Suplantación y tácticas de miedo
• Exfil: Relay WalletConnect
• Indicadores: Dominio no relacionado, urgencia, JavaScript ofuscado y posible envío de formulario.
• Riesgo: ALTO
The site likely attempts to steal cryptocurrency wallet credentials by luring users to connect their wallets via WalletConnect. Obfuscated javascript suggests the presence of malicious code. Clicking the 'Check Your Wallet' likely leads to credential harvesting.
Users may be prompted to enter their seed phrases or other sensitive information, or be directed to a site that appears to authorize a transaction that drains funds.
Pages with identical visual appearance (based on perceptual hash)