Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C0224F33A500CC6A4D9B95CCF2C0A649451EC346FB3148CAB1A081FFBBD0DF169AA79D |
|
CONTENT
ssdeep
|
192:fpkHzjYcLcQchVAy4RGJaiMcnthWeNWbZfMmUU8VCo3UVK:fcLcQchVAy4QETfMmUFCo3mK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b13133cececec688 |
|
VISUAL
aHash
|
c3c3c3ffffffffff |
|
VISUAL
dHash
|
0c9e960c30000001 |
|
VISUAL
wHash
|
c0c0c0f8f0f0f3f3 |
|
VISUAL
colorHash
|
07200030000 |
|
VISUAL
cropResistant
|
0c9e960c30000001,8080a2a2a280a280,7233eee2ecf2b24c |
• Amenaza: Phishing de robo de credenciales
• Objetivo: Clientes de Dakota Central
• Método: Imita una página de inicio de sesión de Dakota Central.
• Exfil: Potencialmente desconocido, datos enviados al sitio Framer.app.
• Indicadores: Alojamiento en Framer.app, ofuscación, envío de formulario.
• Riesgo: ALTO
The attacker sets up a login form that looks like a Dakota Central login page. When users enter their email and password, this data is sent to the attacker. The use of Framer.app is often used because of its simplicity and ease of use in deployment.
The attacker likely uses code obfuscation to hide the intent of the Javascript code, making it difficult to analyze. The use of base64_strings and fromCharCode are techniques of hiding the real purpose of the javascript used.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain