Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19593B8B29251243320BFB1D5F1297709A2D3D74EC68287D1E2FCA36B1ED6CA1F817856 |
|
CONTENT
ssdeep
|
1536:u8QXWnSravouOssorJBPmzzXXMd6MiucCOK:1QXWdvouOOTmzzXXMd6M1cCOK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b31363936ccccc9c |
|
VISUAL
aHash
|
0000e3dbffffffc3 |
|
VISUAL
dHash
|
c8c80e3638002606 |
|
VISUAL
wHash
|
000042c3dfffdfc3 |
|
VISUAL
colorHash
|
07200008280 |
|
VISUAL
cropResistant
|
c8c80e3638002606,46c6073f5d2d33f1 |
• Amenaza: No detectada.
• Objetivo: N/A
• Método: N/A
• Exfil: N/A
• Indicadores: El dominio es robloxc.com.es que no es roblox.com
• Riesgo: BAJO - Potencialmente un intento de recolección de datos, pero no hay evidencia clara de actividad maliciosa en la captura de pantalla.
The phishing kit employs a credential harvester to capture Roblox usernames and passwords in real-time. Submitted credentials are likely exfiltrated to a remote server controlled by the attacker for immediate account takeover.
The kit includes modules for intercepting one-time passwords (OTP) and stealing payment card details. This enables attackers to bypass multi-factor authentication and conduct unauthorized transactions.
Large JavaScript payload containing credential harvesting, OTP interception, and payment card stealing functionality.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain