Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T147825536D148293EC23307CA9FD763A8F3E35095DADD0991E2F9D2791693D61D2232E4 |
|
CONTENT
ssdeep
|
192:IUtlHMAJzeOxdqjKbEJB6GlWcdWGYVUFOFLFajBuajKbEJL:7tJMASOxdqjAIlWcdWGYVU0RgjJjAG |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
880af2f3e3c8ccda |
|
VISUAL
aHash
|
ff000000ffffffff |
|
VISUAL
dHash
|
69fff3f38f1c8e1e |
|
VISUAL
wHash
|
050000003fffffff |
|
VISUAL
colorHash
|
06000280030 |
|
VISUAL
cropResistant
|
01480149499100ff,ae80897971c980ae,22008f16200e3600,fffff3fbb3f3cfff |
• Amenaza: Kit de phishing para robo de credenciales
• Objetivo: Usuarios de billeteras Trezor
• Método: Descripción falsa de la app Trezor Suite con formulario de suscripción
• Exfil: Datos enviados mediante envío de formulario JavaScript
• Indicadores: Hosting gratuito, discrepancia de dominio, JavaScript ofuscado
• Riesgo: ALTO - Posible robo de credenciales y distribución de malware
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain