Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19593B8B29251243320BFB1D5F1297709A2D3D74EC68287D1E2FCA36B1ED6CA1F817856 |
|
CONTENT
ssdeep
|
1536:u8QXWnSravouOssorJBPmzzXXMd6MiucCOK:1QXWdvouOOTmzzXXMd6M1cCOK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b31363936ccccc9c |
|
VISUAL
aHash
|
0000e3dbffffffc3 |
|
VISUAL
dHash
|
c8c80e3638002606 |
|
VISUAL
wHash
|
000042c3dfffdfc3 |
|
VISUAL
colorHash
|
07200008280 |
|
VISUAL
cropResistant
|
c8c80e3638002606,46c6073f5d2d33f1 |
• Ameaça: Nenhuma detectada.
• Alvo: N/A
• Método: N/A
• Exfil: N/A
• Indicadores: O domínio é robloxc.com.es que não é roblox.com
• Risco: BAIXO - Potencialmente uma tentativa de coleta de dados, mas sem evidências claras de atividade maliciosa na captura de tela.
The phishing kit employs a credential harvester to capture Roblox usernames and passwords in real-time. Submitted credentials are likely exfiltrated to a remote server controlled by the attacker for immediate account takeover.
The kit includes modules for intercepting one-time passwords (OTP) and stealing payment card details. This enables attackers to bypass multi-factor authentication and conduct unauthorized transactions.
Large JavaScript payload containing credential harvesting, OTP interception, and payment card stealing functionality.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain