Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DFB2F27094B5B63F009F7391A7386705A3D39783CB620BE567F8936D4B8AE84DC23169 |
|
CONTENT
ssdeep
|
192:bixLoxwz77qKHv/ySchJrVUmZGkozXTCReWyRMOsUFf9kIT/JO:mx8xw7pvKpJrVUIGku+TxFUH/JO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e96b899c962666c3 |
|
VISUAL
aHash
|
f9e9e1f7ff81c3ff |
|
VISUAL
dHash
|
2b030327382b1342 |
|
VISUAL
wHash
|
a9a1e1c7c78181fb |
|
VISUAL
colorHash
|
07000000006 |
|
VISUAL
cropResistant
|
2b030327382b1342,696969c9692b3734,337367e7cdcd8d1d,0000db6464649b24 |
The phishing kit employs form-based credential harvesting to capture login credentials and one-time passwords (OTPs) submitted by victims. The kit likely intercepts OTPs in real-time, enabling attackers to bypass multi-factor authentication (MFA) protections on Banking or service accounts.
Beyond credentials, the kit targets additional personal and financial data, including Banking details, through structured forms. This data can be used for identity theft, financial fraud, or sold on underground markets.
Highly obfuscated JavaScript file with multiple evasion techniques to prevent analysis and detection.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain