Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F3B1123031542ABB61C799F1B3A22B2E72E8C658CA27C649B3F5C35A6BDBC15CD40364 |
|
CONTENT
ssdeep
|
96:MTLCh/am/hVRt0UTM8////LQA0nJCPD9RJ4nsB:MTLC4mpVRt0UTHHbQZQD9RJ4nI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c3693c966dc79238 |
|
VISUAL
aHash
|
00202420007e7e00 |
|
VISUAL
dHash
|
a6c9c9c6f0e8e833 |
|
VISUAL
wHash
|
72747c70187e7e18 |
|
VISUAL
colorHash
|
31200030000 |
|
VISUAL
cropResistant
|
3866c7c7c7ce567c,8383abb1b18b0383,2b6b2b2b2b2b2b2b,a6c9c9c6f0e8e833 |
• Ameaça: Phishing
• Alvo: Usuários do Blockchain.com
• Método: Impersonificação via sorteio falso.
• Exfil: wheal.php (Envio de formulário)
• Indicadores: Incompatibilidade de domínio, ofuscação de Javascript, sorteio
• Risco: Alto
The attacker attempts to steal user credentials (email) by offering a fake giveaway. User enters email on the form.
Pages with identical visual appearance (based on perceptual hash)