Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F8628331F075643B011F75E0F1A6970AE2DBC30ECBA28BE4E6B892E057D9CD5AD27605 |
|
CONTENT
ssdeep
|
192:U1Yk8D/ojEvQtJVVvmdiAjtyTfpOgsKbeJOdtAojtIv1+25MqfYcJXE4vrz12eho:bwjwiJwhytbRbeJ4fE1tNJ1wNV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9959a42766dc9936 |
|
VISUAL
aHash
|
18181818251f1f3f |
|
VISUAL
dHash
|
d1b2303169707474 |
|
VISUAL
wHash
|
3d181818271f1fbf |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
d1b2303169707474 |
The phishing kit employs a credential harvester to capture usernames, passwords, and other sensitive information submitted via web forms. The data is likely exfiltrated in real-time to an attacker-controlled server.
The kit includes functionality to intercept one-time passwords (OTPs) and steal payment card details, enabling attackers to bypass multi-factor authentication and conduct fraudulent transactions.
Bundled JavaScript file containing obfuscated code for credential harvesting and data exfiltration.
Here's a generic ASCII art attack flow diagram for your phishing scenario:
```
┌──────────────────────────────────────────────────────────┐
│ 1. TARGET RECEIVES DECEPTIVE MESSAGE │
│ - Victim directed to fake Banking site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE SITE DISPLAYED │
│ - Mimics legitimate Banking interface │
│ - Presents credential input form │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIALS ENTERED │
│ - Victim inputs Banking credentials │
│ - Form appears identical to real site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA SUBMISSION │
│ - Form sends credentials via HTTP POST │
│ - Data transmitted to attacker-controlled server │
└──────────────────────────────────────────────────────────┘
```
Here's a generic ASCII art attack flow diagram for your phishing scenario:
```
┌──────────────────────────────────────────────────────────┐
│ 1. TARGET RECEIVES DECEPTIVE MESSAGE │
│ - Victim directed to fake Banking site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE SITE DISPLAYED │
│ - Mimics legitimate Banking interface │
│ - Presents credential input form │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIALS ENTERED │
│ - Victim inputs Banking credentials │
│ - Form appears identical to real site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA SUBMISSION │
│ - Form sends credentials via HTTP POST │
│ - Data transmitted to attacker-controlled server │
└──────────────────────────────────────────────────────────┘
```
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain