Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T155F10E32944CEC3723231FD17592B714E2D6C76ECA421A10D6B9439E0FEBED2E446657 |
|
CONTENT
ssdeep
|
192:8HVJikYMzvUAZ6C3CYEQctxdUAKe8I+jKkrAr+jg1rA+j3rrALdv:+VJikp8AIe7/AKe8I+jKkrAijg1rA+j+ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cc666699333133b3 |
|
VISUAL
aHash
|
0010001818181800 |
|
VISUAL
dHash
|
70624cb2b2b2b24c |
|
VISUAL
wHash
|
001020381c1c1c1c |
|
VISUAL
colorHash
|
070060000c0 |
|
VISUAL
cropResistant
|
98a6b2803336b8b8,70624cb2b2b2b24c |
• Ameaça: Phishing de credenciais
• Alvo: Usuários do BERO HOST
• Método: Impersonation via login page.
• Exfil: JS ofuscado pode indicar onde as credenciais roubadas vão.
• Indicadores: Formulários, ofuscação, envio de formulário JS.
• Risco: ALTO
The site presents a login form to steal user credentials. The obfuscated JavaScript will likely send those credentials to a remote server.
Pages with identical visual appearance (based on perceptual hash)
Found 8 other scans for this domain