Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E441A635A1025E3B022756EAFAA0AF509163D34DCF0B5D18F7F291FA13E0C61D81A4DC |
|
CONTENT
ssdeep
|
24:nxAgfC8zwsRE0w9RYFReh2aMHWsYSwJ3G9DZnij2XXl3hll3g8CmHFl7Xo9gKslv:nxAgG92iMySmGhZrxHFZd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ea57f02bc68313e8 |
|
VISUAL
aHash
|
e4d224341101c3c1 |
|
VISUAL
dHash
|
44366c69255b9797 |
|
VISUAL
wHash
|
e6d2ee34110303c3 |
|
VISUAL
colorHash
|
38000e00000 |
|
VISUAL
cropResistant
|
a200198e8e6180a2,44366c69255b9797 |
• Ameaça: Phishing
• Alvo: Usuários Ledger
• Método: Personificação através de um site falso.
• Exfil: Provavelmente rouba credenciais e/ou criptomoedas.
• Indicadores: Hospedagem Gratuita, Logotipo da Marca, Ofuscação de JavaScript.
• Risco: Alto
The attacker aims to steal user credentials, potentially by luring them to a fake login form disguised as a Ledger site. The goal is to gain access to the user's Ledger wallet.
The site may be used to deliver malicious files, disguised as Ledger-related downloads.
Pages with identical visual appearance (based on perceptual hash)