Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F8628331F075643B011F75E0F1A6970AE2DBC30ECBA28BE4E6B892E057D9CD5AD27605 |
|
CONTENT
ssdeep
|
192:U1Yk8D/ojEvQtJVVvmdiAjtyTfpOgsKbeJOdtAojtIv1+25MqfYcJXE4vrz12eho:bwjwiJwhytbRbeJ4fE1tNJ1wNV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9959a42766dc9936 |
|
VISUAL
aHash
|
18181818251f1f3f |
|
VISUAL
dHash
|
d1b2303169707474 |
|
VISUAL
wHash
|
3d181818271f1fbf |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
d1b2303169707474 |
The phishing kit is designed to capture user credentials through form submissions. The kit likely intercepts input fields in real-time or upon submission, exfiltrating data to a remote server controlled by the attacker.
Secondary attack vectors include stealing one-time passwords (OTPs) and payment card details. This suggests the kit may dynamically present OTP or card input fields based on user interaction or pre-defined triggers.
Bundled JavaScript file containing obfuscated code for credential harvesting and data exfiltration.
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
┌──────────────────────────────────────────────────────────┐
│ 1. TARGET RECEIVES DECEPTIVE MESSAGE │
│ - Victim directed to fake Banking site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE SITE DISPLAYED │
│ - Mimics legitimate Banking interface │
│ - Presents credential input form │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIALS ENTERED │
│ - Victim submits login details │
│ - Form appears to process normally │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA CAPTURED │
│ - Credentials collected by attacker │
│ - Submitted via standard HTTP POST │
└──────────────────────────────────────────────────────────┘
```
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
┌──────────────────────────────────────────────────────────┐
│ 1. TARGET RECEIVES DECEPTIVE MESSAGE │
│ - Victim directed to fake Banking site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE SITE DISPLAYED │
│ - Mimics legitimate Banking interface │
│ - Presents credential input form │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIALS ENTERED │
│ - Victim submits login details │
│ - Form appears to process normally │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA CAPTURED │
│ - Credentials collected by attacker │
│ - Submitted via standard HTTP POST │
└──────────────────────────────────────────────────────────┘
```
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain