Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E6611F40D313693F1A33E0D89A9E7E13AAE8C435D28E291477FED35A92ECD4E6C161C5 |
|
CONTENT
ssdeep
|
96:nUuS5Fr+2XpvIWyoe9Re7bpSTJXOM041PAtWVu:9SOGvr97bYnzEWw |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b939c6c61c2d6713 |
|
VISUAL
aHash
|
008f83839fffffff |
|
VISUAL
dHash
|
661c1e1a38021000 |
|
VISUAL
wHash
|
0083818181dfffff |
|
VISUAL
colorHash
|
07003008040 |
|
VISUAL
cropResistant
|
661c1e3a38021000,0000814656560681,ce973331313371f1,5a585898991b8387,0000303030100000 |
• Amenaza: Phishing de credenciales
• Objetivo: Clientes de Aruba.it
• Método: Impersonación y recolección de credenciales
• Exfil: infos.php (basado en la acción del formulario)
• Indicadores: Coincidencia de dominio, Ofuscación de Javascript, Formulario presente
• Riesgo: ALTO
The attackers are using a fake login page that mimics the design of Aruba.it's login page. When a user enters their credentials, the information is sent to a malicious server.
The malicious javascript obfuscates the exfiltration logic to evade detection.
Pages with identical visual appearance (based on perceptual hash)