Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B98173768022EE27158B99E26671835F32D6EB0ADD6B0B062BFD93EC4FC5CD0CC86005 |
|
CONTENT
ssdeep
|
96:tdkcFJU9CQsftmWZaZAZ7u1ZnREV+FO8TA:YcFJp6eS84REh1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
af3e2e2a2a2e2e2a |
|
VISUAL
aHash
|
81ffbfffffffffff |
|
VISUAL
dHash
|
33446640c0c0c0c0 |
|
VISUAL
wHash
|
00203e3e7c7c7c7c |
|
VISUAL
colorHash
|
07000000007 |
|
VISUAL
cropResistant
|
33446640c0c0c0c0,aeeea7b337ccf4f0 |
• Amenaza: Suplantación de identidad
• Objetivo: Usuarios de WhatsApp
• Método: Página web que finge integración social/comercial
• Exfil: Recopilación mediante JavaScript
• Indicadores: Dominio reciente y nombre falso
• Riesgo: Alto
The site lures users into scanning a QR code, which is likely a malicious WhatsApp Web link intended to link the victim's account to the attacker's device.
The site attempts to gain user trust by pretending to be a legitimate business tool.