Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17EF1E8A2A15C48083226C681BEA1FE486337CA46CB5D193AB1B62457B3DE5F4C1373A1 |
|
CONTENT
ssdeep
|
96:Crhvf25BPf2iSiSz5TdvVXZXh9h1kD5OEpdjKlVZsquTn1P/y8tj7PadPOQie:MU/SiSphFZvkDZ1Kl/squpP/y8tvSdPz |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f3151d62e68c4a37 |
|
VISUAL
aHash
|
0000dfffe780ffff |
|
VISUAL
dHash
|
d49632cc4d118401 |
|
VISUAL
wHash
|
000081ffe700ffff |
|
VISUAL
colorHash
|
07006000080 |
|
VISUAL
cropResistant
|
d49632cc4d118401,0000202000000000 |
• Ameaça: Phishing
• Alvo: Usuários desavisados
• Método: Sorteio enganoso
• Exfil: Desconhecido (provavelmente credenciais ou informações pessoais)
• Indicadores: Domínio não relacionado, sorteio, entradas de formulário.
• Risco: Alto
The site likely aims to collect personal information from users, possibly through a form hidden in the page's code or a redirect after the user selects a prize. The obfuscation detected would likely be used to make it harder to detect such malicious code.
Pages with identical visual appearance (based on perceptual hash)