Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T171A131E23899593E33F346DAF0A2975830CA9599C441B409D69517FD07D8EA2ECCE31F |
|
CONTENT
ssdeep
|
96:M6aVeiWnXI0wVWdAXH2k8lcC3rIjfeb1GmcoGkGcGBavG61GEOG0K1GY4tVM1GYN:JXsWd4HLscC51GmVGkGcGO1GEOGN1GYh |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b326790cd986f326 |
|
VISUAL
aHash
|
000000ffffffffff |
|
VISUAL
dHash
|
8c2849320c10041b |
|
VISUAL
wHash
|
000000fffcfce1ff |
|
VISUAL
colorHash
|
07e00000000 |
|
VISUAL
cropResistant
|
8c2849320c10041b |
• Ameaça: Phishing
• Alvo: Usuários do Mercado Livre
• Método: Imitação por meio de um formulário de login em um subdomínio inesperado
• Exfil: Desconhecido
• Indicadores: Subdomínio, formulário de login.
• Risco: Alto
The attacker aims to steal user credentials by presenting a login form on a page that is supposed to be unrelated to the login process. The user, believing it's a genuine login prompt, enters their credentials, which are then captured by the attacker.
melidata.min.jsPages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain