Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B411CE6040809C7BE243D1F417A1E30536C5CA57CA0716006FF8D79C6BE7D6ADD45C91 |
|
CONTENT
ssdeep
|
12:nwMy7FUPDWYN/s6wlAaItl7MBqNct/+SshOgNQHZo3f68GHFf3oJDwxIK4S:n/CM3N/owiBGrfhOgN1TOwNwmS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
999999cd64666666 |
|
VISUAL
aHash
|
3c3c000000000000 |
|
VISUAL
dHash
|
70704c3004000000 |
|
VISUAL
wHash
|
fcfce4fc00000000 |
|
VISUAL
colorHash
|
07000000038 |
|
VISUAL
cropResistant
|
70704c3004000000 |
• Ameaça: Phishing
• Alvo: Usuários não especificados
• Método: Coleta de credenciais
• Exfil: Telegram
• Indicadores: Domínio suspeito, formulário de login genérico, token do Telegram, ofuscação.
• Risco: Alto
The site uses a fake login form to steal user credentials (email and password). The entered information is likely sent to a remote server controlled by the attacker.
The attacker uses a Telegram bot to collect the stolen credentials.
| ID | Português | Inglês | Trigger |
|---|---|---|---|
Pages with identical visual appearance (based on perceptual hash)