Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10BA1121C12853B4F999952A2D3752E94D3E1941EC7324C58A85EE72F1C8814EEC7F9FC |
|
CONTENT
ssdeep
|
96:A3ydpoIL/N+lglAtyHL5ZiNrft5CLJWfsT3yDSxyHJHAPboRbDv72oDSZHlfd5D:j2bcRM3a0QD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b2969b3131dccc99 |
|
VISUAL
aHash
|
dfe7bdc3c3ffefff |
|
VISUAL
dHash
|
394c68049e600800 |
|
VISUAL
wHash
|
1f273f3f03130303 |
|
VISUAL
colorHash
|
07018000600 |
|
VISUAL
cropResistant
|
394c68049e600800 |
The phishing kit captures user credentials via a fake login form mimicking plala's authentication portal. Submitted data is likely exfiltrated to an attacker-controlled server in real-time.
Post-credential theft, the kit may deploy additional scripts to intercept Banking sessions or prompt users for financial details under false pretenses.
Obfuscated JavaScript file likely containing credential harvesting logic.
┌──────────────────────────────────────────────────────────┐
│ 1. ATTACKER DEPLOYS FAKE PLALA SITE │
│ - Mimics legitimate Banking portal │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. VICTIM RECEIVES PHISHING LURE │
│ - Email/SMS with fake login link │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. VICTIM ENTERS CREDENTIALS │
│ - Submits login details to fake form │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. CREDENTIALS EXFILTRATED │
│ - Data sent via HTTP POST to attacker-controlled │
│ server │
└──────────────────────────────────────────────────────────┘
┌──────────────────────────────────────────────────────────┐
│ 1. ATTACKER DEPLOYS FAKE PLALA SITE │
│ - Mimics legitimate Banking portal │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. VICTIM RECEIVES PHISHING LURE │
│ - Email/SMS with fake login link │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. VICTIM ENTERS CREDENTIALS │
│ - Submits login details to fake form │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. CREDENTIALS EXFILTRATED │
│ - Data sent via HTTP POST to attacker-controlled │
│ server │
└──────────────────────────────────────────────────────────┘
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain