Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B4A283387295567B31C795F2B7216B6D7298C24FC727DA88A3F8C28977DEC668C61300 |
|
CONTENT
ssdeep
|
384:qCsq6VZsVBChUqL2OHfvm4tTig+4/2m2VVUrvA+QFXhkVDHi:qtVdmoHfvjsQjA+SXhktHi |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fc3a6aa581e11f26 |
|
VISUAL
aHash
|
8f0181ffffe2e2f0 |
|
VISUAL
dHash
|
5f35159696568616 |
|
VISUAL
wHash
|
8f0101ffe3e2e0f8 |
|
VISUAL
colorHash
|
07006008000 |
|
VISUAL
cropResistant
|
ffffdde9f1f9dfff,ffffdde9f1f9ddff,5f35159696568616 |
• Threat: Phishing targeting Binance users
• Target: Users of Binance Cloud Mining
• Method: Deceptive popup claiming earned BTC and imminent account blockage to initiate fake withdrawal procedure
• Exfil: Likely to a custom API or directly to the attacker for credential/payment information theft
• Indicators: Domain mismatch (zecpu.cc vs binance.com), urgency tactic (account block), suspicious withdrawal procedure
• Risk: HIGH - Potential for credential theft and cryptocurrency loss
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain