Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BA725410D904991D01DF8DC5E1736A5822F843AEC31304D8FE60ABFAA6EF839D777669 |
|
CONTENT
ssdeep
|
192:PPpbmWkEcGMkRY/zO2YzorUiXwHBw+FhYEUCpsdxEH5LgnttAjg+ust7VaHa4Xjf:Jbm92UGYEROEXUac7x |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3cecc3364cc3364 |
|
VISUAL
aHash
|
ffffefcfc3c3ffff |
|
VISUAL
dHash
|
28284c1c5d5c1818 |
|
VISUAL
wHash
|
3c24040cc3c3cfdf |
|
VISUAL
colorHash
|
07c00010000 |
|
VISUAL
cropResistant
|
28284c1c5d5c1818,b02030f293b2f070,c34f3f3f3f3f3f3c |
• Ameaça: Phishing
• Alvo: Usuários do Meta
• Método: Personificação e coleta de credenciais
• Exfil: https://financeroutine.com/, //translate.googleapis.com/translate_voting?client=te
• Indicadores: Incompatibilidade de domínio, JavaScript ofuscado, vários formulários.
• Risco: Alto
The site uses a visually similar design and branding to impersonate Meta and attempt to collect user credentials through a form, or by redirecting to a phishing site.
Javascript code obfuscation attempts to hide malicious behavior.
Functions: iziToast['error']() - Displays fake error message to manipulate user, URLSearchParams - Checks for malicious URL parameter (utm_campaign=lnnf), Cloudflare script injection (c function) - Loads external challenge script, setTimeout - Delays malicious behavior to avoid immediate detection
1. Step 1: User lands on page via malicious short link (e.g., sw.run/Verifybluetick) 2. Step 2: URL parameter `utm_campaign=lnnf` triggers fake error message after 2.5 seconds 3. Step 3: Fake 'URL Not Found' toast appears, pressuring user to take action (e.g., re-enter credentials or click a malicious link) 4. Step 4: Cloudflare challenge script loads, potentially enabling further malicious activity (e.g., keylogging, form hijacking) 5. Step 5: Obfuscated functions (n, c, u, p, o, f, i, r) capture and exfiltrate user data (e.g., form submissions, session tokens)
1. Step 1: User lands on page via malicious short link (e.g., sw.run/Verifybluetick) 2. Step 2: URL parameter `utm_campaign=lnnf` triggers fake error message after 2.5 seconds 3. Step 3: Fake 'URL Not Found' toast appears, pressuring user to take action (e.g., re-enter credentials or click a malicious link) 4. Step 4: Cloudflare challenge script loads, potentially enabling further malicious activity (e.g., keylogging, form hijacking) 5. Step 5: Obfuscated functions (n, c, u, p, o, f, i, r) capture and exfiltrate user data (e.g., form submissions, session tokens)
element.jsiziToast['error']() - Displays fake error message to manipulate userURLSearchParams - Checks for malicious URL parameter (utm_campaign=lnnf)Cloudflare script injection (c function) - Loads external challenge scriptsetTimeout - Delays malicious behavior to avoid immediate detectionPages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain