Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A1B1C01493412B0E64A591F6C3606FA843E28C2ED7321958985EE63F1CCD54EED6BBFC |
|
CONTENT
ssdeep
|
96:jN4CpfHSfo47lGCty5vk+7TSTre5b1/LhC5Sb3yJSLP0z3lKZVwcbwYxyCPoZz0F:jWUyUBWcb10KibALJxawD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
969339389e9998dc |
|
VISUAL
aHash
|
1c243c3c3c000000 |
|
VISUAL
dHash
|
394d686865140000 |
|
VISUAL
wHash
|
1c243c3c3f030f0f |
|
VISUAL
colorHash
|
07050000400 |
|
VISUAL
cropResistant
|
394d686865140000 |
• Ameaça: Phishing de credenciais
• Alvo: Usuários do plala
• Método: Imitação da página de login
• Exfil: cgi-binsso/pf/agent_sso.php
• Indicadores: Formulários solicitando credenciais, domínio suspeito
• Risco: ALTO
The attacker is using a fake login form to collect user credentials.
1. Step 1: Malicious script loads and decrypts strings (e.g., form fields, C2 URL) 2. Step 2: Dynamic form injection into the DOM (likely via td_5a.td_4w or similar) 3. Step 3: User enters credentials into fake banking form 4. Step 4: td_5a.td_5y captures input data 5. Step 5: td_5a.td_2d initializes XMLHttpRequest and sends data to C2 server
1. Step 1: Malicious script loads and decrypts strings (e.g., form fields, C2 URL) 2. Step 2: Dynamic form injection into the DOM (likely via td_5a.td_4w or similar) 3. Step 3: User enters credentials into fake banking form 4. Step 4: td_5a.td_5y captures input data 5. Step 5: td_5a.td_2d initializes XMLHttpRequest and sends data to C2 server
tdz_8e2a25279bc64e9ab2f073b3c73f45ac.jstd_5a.td_2d (XMLHttpRequest initializer)td_5a.tdz_8e2a25279bc64e9ab2f073b3c73f45ac.td_f (string decryption)td_5a.td_2m (ActiveX fallback)td_5a.td_4w (likely form submission handler, from Round 1)td_5a.td_5y (likely data collection, from Round 1)Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain