Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F3B1123031542ABB61C799F1B3A22B2E72E8C658CA27C649B3F5C35A6BDBC15CD40364 |
|
CONTENT
ssdeep
|
96:MTLCh/am/hVRt0UTM8////LQA0nJCPD9RJ4nsB:MTLC4mpVRt0UTHHbQZQD9RJ4nI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c3693c966dc79238 |
|
VISUAL
aHash
|
00202420007e7e00 |
|
VISUAL
dHash
|
a6c9c9c6f0e8e833 |
|
VISUAL
wHash
|
72747c70187e7e18 |
|
VISUAL
colorHash
|
31200030000 |
|
VISUAL
cropResistant
|
3866c7c7c7ce567c,8383abb1b18b0383,2b6b2b2b2b2b2b2b,a6c9c9c6f0e8e833 |
• Ameaça: Phishing
• Alvo: Usuários do Blockchain.com
• Método: Imitação e um sorteio falso.
• Exfil: wheal.php (Envio de formulário)
• Indicadores: Domínio suspeito, oferta de sorteio, código ofuscado.
• Risco: Alto
The attacker aims to steal user credentials by mimicking Blockchain.com and offering a fake giveaway. Users are prompted to enter their email address which is then collected. The form submission likely redirects to a server controlled by the attacker.
Hidden javascript could inject malware.
Pages with identical visual appearance (based on perceptual hash)