Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11B41877150508C77B583CADC76E89A1A35C2C109CBE31A0866FC97AC2BEDD9BED13258 |
|
CONTENT
ssdeep
|
48:nIYBo+Nws5tCUmlS+WhhtXMz6Cn6fSBgoI6s+JuU:nhek+W7GSqNZJB |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ca89c926b26b6d59 |
|
VISUAL
aHash
|
f8f8f8f0f4f0f0f8 |
|
VISUAL
dHash
|
1113110505050101 |
|
VISUAL
wHash
|
f8f8f8f0f0e0e0e0 |
|
VISUAL
colorHash
|
06000000e00 |
|
VISUAL
cropResistant
|
040c0c0101010000,0000000000000000,86ccec7179eccc96,131f3343c3a31e14 |
The phishing kit captures user credentials by presenting a fake Microsoft Excel login page. Submitted credentials are likely exfiltrated to a remote server controlled by the attacker for immediate use or sale.
The kit includes forms designed to harvest additional personal information, such as name, address, or phone number, which can be used for identity theft or further targeted attacks.
No specific malicious JavaScript files detected, but high obfuscation indicates evasion techniques.
┌──────────────────────────────────────────────────────────┐
│ 1. TARGET RECEIVES PHISHING LURE │
│ - Email/SMS with fake Excel Banking alert │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. VICTIM CLICKS MALICIOUS LINK │
│ - Redirects to fake Excel login page │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIAL INPUT │
│ - Victim enters Banking credentials │
│ - Form appears identical to legitimate Excel site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. CREDENTIAL EXFILTRATION │
│ - Data sent via HTTP POST (standard form submission) │
│ - Attacker receives stolen credentials │
└──────────────────────────────────────────────────────────┘
┌──────────────────────────────────────────────────────────┐
│ 1. TARGET RECEIVES PHISHING LURE │
│ - Email/SMS with fake Excel Banking alert │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. VICTIM CLICKS MALICIOUS LINK │
│ - Redirects to fake Excel login page │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIAL INPUT │
│ - Victim enters Banking credentials │
│ - Form appears identical to legitimate Excel site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. CREDENTIAL EXFILTRATION │
│ - Data sent via HTTP POST (standard form submission) │
│ - Attacker receives stolen credentials │
└──────────────────────────────────────────────────────────┘
Pages with identical visual appearance (based on perceptual hash)