Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BD31547492708826418253C53FF1674AB3828346FB171E4436FA87AC1EF9E5BCC1E4A5 |
|
CONTENT
ssdeep
|
24:hRfCLBADenvFZoZJjiMfpRhfl7Xo3VfVKuOvWAwa:TgBIenvEZViMfdftCtKeA1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
aa57f12846e313f8 |
|
VISUAL
aHash
|
e6da2c341101c381 |
|
VISUAL
dHash
|
54366c69255b9707 |
|
VISUAL
wHash
|
e6dabc3d1103c3c3 |
|
VISUAL
colorHash
|
30000c00000 |
|
VISUAL
cropResistant
|
db576e9932e4d0a0,a2809acccc8c80aa,54366c69255b9707 |
• Amenaza: Phishing
• Objetivo: Usuarios de Ledger
• Método: Impersonación a través de un sitio web falso en alojamiento gratuito.
• Exfil: Desconocido, pero el envío de formularios y la ofuscación de javascript sugieren el robo de credenciales.
• Indicadores: Alojamiento Vercel.app, logotipo de Ledger presente.
• Riesgo: Alto
The attacker likely aims to steal user credentials (username, password, seed phrases) by tricking victims into entering them into a fake login form or similar.
The obfuscated JavaScript could attempt to inject malicious code to steal information or redirect the user to a more sophisticated phishing page.
Pages with identical visual appearance (based on perceptual hash)
Found 7 other scans for this domain