Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BD31547492708826418253C53FF1674AB3828346FB171E4436FA87AC1EF9E5BCC1E4A5 |
|
CONTENT
ssdeep
|
24:hRfCLBADenvFZoZJjiMfpRhfl7Xo3VfVKuOvWAwa:TgBIenvEZViMfdftCtKeA1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
aa57f12846e313f8 |
|
VISUAL
aHash
|
e6da2c341101c381 |
|
VISUAL
dHash
|
54366c69255b9707 |
|
VISUAL
wHash
|
e6dabc3d1103c3c3 |
|
VISUAL
colorHash
|
30000c00000 |
|
VISUAL
cropResistant
|
db576e9932e4d0a0,a2809acccc8c80aa,54366c69255b9707 |
• Ameaça: Phishing
• Alvo: Usuários Ledger
• Método: Personificação via um site falso em hospedagem gratuita.
• Exfil: Desconhecido, mas o envio de formulários e a ofuscação de javascript sugerem roubo de credenciais.
• Indicadores: Hospedagem Vercel.app, logotipo Ledger presente.
• Risco: Alto
The attacker likely aims to steal user credentials (username, password, seed phrases) by tricking victims into entering them into a fake login form or similar.
The obfuscated JavaScript could attempt to inject malicious code to steal information or redirect the user to a more sophisticated phishing page.
Pages with identical visual appearance (based on perceptual hash)
Found 7 other scans for this domain