Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11AA283387295567B31C795F2B7216B6D7298C24FC727DA88A3F8C28977DEC668C61300 |
|
CONTENT
ssdeep
|
384:OCsq6hsVBChUqL2OHfvm4tTig+4/2m2VVUrvA+QFXhkVDHV:OtFmoHfvjsQjA+SXhktHV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fc3a6aa581e11f26 |
|
VISUAL
aHash
|
8f0181ffffe2e2f0 |
|
VISUAL
dHash
|
5f35159696568616 |
|
VISUAL
wHash
|
8f0101ffe3e2e0f8 |
|
VISUAL
colorHash
|
07006008000 |
|
VISUAL
cropResistant
|
ffffdde9f1f9dfff,ffffdde9f1f9ddff,5f35159696568616 |
• Amenaza: Phishing
• Objetivo: Usuarios de Binance
• Método: Suplantación de identidad y urgencia
• Exfil: Probablemente roba credenciales de inicio de sesión y, posiblemente, información financiera.
• Indicadores: Dominio nuevo, saldo falso de BTC, cuenta regresiva e instrucciones para retirar fondos.
• Riesgo: ALTO
The site is attempting to trick users into entering their Binance login credentials, likely through a form or link to a fake login page. The promise of a large Bitcoin balance and the threat of account blocking creates a strong incentive.
The site uses social engineering tactics, such as creating a sense of urgency and offering a reward, to manipulate users into providing their sensitive information. The use of a countdown timer increases the pressure.
Pages with identical visual appearance (based on perceptual hash)