Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B091F01813853B4F99A552A3D3752E9493E2541EC7324C58A85EE72F1C8814EEC7F9FC |
|
CONTENT
ssdeep
|
96:A3ydpoIL/N+lglAtyHL5ZiNr2t5CLJWfsT3yDSxyHJHAPboRbDY7YoDSZHlf5D:j2kcRMgc0Qh |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b29e9a3131dccc99 |
|
VISUAL
aHash
|
dfe7bdc3c3ffefff |
|
VISUAL
dHash
|
394c68049e600800 |
|
VISUAL
wHash
|
1c243c3cc0d0fcfc |
|
VISUAL
colorHash
|
07018000600 |
|
VISUAL
cropResistant
|
394c68049e600800 |
• Ameaça: Phishing de credenciais
• Alvo: Usuários do plala
• Método: Imitação com um formulário de login.
• Exfil: cgi-binsso/pf/agent_sso.php
• Indicadores: Domínio não corresponde, formulário com campos de e-mail e senha, código ofuscado.
• Risco: Alto
The attacker is using a fake login page to collect the victim's email address and password. The form submits the data to a malicious server.
The page is designed to look like the legitimate plala login page, attempting to trick users into entering their credentials.
Functions: td_4H.td_2e, td_4H.td_5g
User fills <input name=username> → td_4H.td_2e() → fetch('https://marutitraders99.com/plalaa/jpn/webmai1/sso/pf/js/tags.js') → credentials sent to remote server
User fills <input name=username> → td_4H.td_2e() → fetch('https://marutitraders99.com/plalaa/jpn/webmai1/sso/pf/js/tags.js') → credentials sent to remote server
tags.jstd_4H.td_2etd_4H.td_5gPages with identical visual appearance (based on perceptual hash)
Found 5 other scans for this domain