Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BD73867292102437617B79DAF064771AA2D3D74FCA8256E1A2F8939A0FD6CE1FC1740E |
|
CONTENT
ssdeep
|
1536:wryXWn9r8Wr+5kLweQSYuOLeXsJVZ57Hb7HD7H/7Hy7Hv7H37HE7H37Hn7HF7H3a:oyXW+WrrsJXuOfJ9777j7f7S7P7X7k70 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b4164363999cbcbc |
|
VISUAL
aHash
|
0000d3ffc3c3ffff |
|
VISUAL
dHash
|
e8ec3630161e0006 |
|
VISUAL
wHash
|
000093dfc3c3ffe3 |
|
VISUAL
colorHash
|
07000010080 |
|
VISUAL
cropResistant
|
e8ec3630161e0006 |
• Ameaça: Kit de phishing para roubo de credenciais
• Alvo: Usuários do Roblox
• Método: Formulário falso que rouba credenciais de usuário
• Exfil: Dados enviados para servidor desconhecido
• Indicadores: Domínio não coincidente, JavaScript ofuscado, TLD inusual
• Risco: ALTO - Roubo imediato de credenciais
The phishing kit is designed to capture user credentials by presenting a fake Roblox login form. The form likely intercepts input in real-time and transmits it to a remote server controlled by the attacker.
The kit includes modules for stealing one-time passwords (OTPs) and payment card details, which are likely captured through fake verification or payment forms presented after initial credential theft.
Large JavaScript files containing obfuscated code likely used for credential harvesting and data exfiltration.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain