Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CE526032A051B53740C383F2AB302BAABBE0C2A7D693464595F8C35C5BD1D52DD2F62B |
|
CONTENT
ssdeep
|
192:CSZeRQxgRj5sMiDM6Mc+TfyKTpfT4I40STp4MnloFnxpq/+1qp31qPaWI:CJREaP6McWa6trZyhnixpaUk0XI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec6c9393cb693161 |
|
VISUAL
aHash
|
fff3c191f9ffe7cf |
|
VISUAL
dHash
|
5b262723230c861e |
|
VISUAL
wHash
|
fde38181f1ff0103 |
|
VISUAL
colorHash
|
07400080001 |
|
VISUAL
cropResistant
|
5b262723230c861e,3f3767e3f2a22c34 |
• Amenaza: Kit de phishing para robo de credenciales
• Objetivo: Usuarios de TK Store internacionalmente
• Método: Formulario falso que roba credenciales de usuario
• Exfil: Datos enviados a través de JavaScript ofuscado
• Indicadores: Dominio no coincidente, JS ofuscado, dominio reciente
• Riesgo: ALTO - Robo inmediato de credenciales
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain