Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E17384B1521DA6BE41C7C2E897770B5A33A9C6D4E723012466FC93B80FEBC96DE27150 |
|
CONTENT
ssdeep
|
1536:u2Rk9FAYNbXIAV8MxXNQpfmpqC6XE2Qjxmp1o7x:u8+6MrIAGMxXNQpfml6XEVjxmHo7x |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e6989866d992c5c7 |
|
VISUAL
aHash
|
c7cfffe3e3e1e3ff |
|
VISUAL
dHash
|
3e3e2c0b4e4f4f12 |
|
VISUAL
wHash
|
838383e3e1e1e3e3 |
|
VISUAL
colorHash
|
07601000040 |
|
VISUAL
cropResistant
|
3e3e2c0b4e4f4f12,801024e46430c000,08223c386031652c,cd4d4dac2f6fad3c |
• Amenaza: Phishing
• Objetivo: Usuarios de Facebook
• Método: Suplantación para robar datos o credenciales
• Exfil: Potencialmente varía, basado en formularios y acciones ocultas.
• Indicadores: Dirección IP, JS Ofuscado, Promete una Insignia Verificada
• Riesgo: Alto
The site impersonates Meta/Facebook and tricks users into providing their login credentials or other sensitive information.
The site uses a 'Verified Badge' to lure users, creating a sense of urgency or reward.
Functions: buildAndSend, sendToServer, setForm1
User fills <input name='full-name'> → setForm1() → buildAndSend() → fetch(http://185.199.224.13/server_process_data.php) → exfiltration of user data
User fills <input name='full-name'> → setForm1() → buildAndSend() → fetch(http://185.199.224.13/server_process_data.php) → exfiltration of user data
config_sys.jsbuildAndSendsendToServersetForm1Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain