Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1681255B195809D3B129786E4AA71AB0F77E44788CF432B11BAF853DE1FC6CA5DC4B091 |
|
CONTENT
ssdeep
|
96:n4duiEpxl+JQfPrxzoqiwMQZBRnMRH4RJu/wJ/Fx6/lO4IhbP1hDss8Mcr8QbHA+:1vnr15ZkhOSw4KNKsfcrvbWfLiwqgw |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a70f8d0f27078d0f |
|
VISUAL
aHash
|
3fffffe7e7ffffff |
|
VISUAL
dHash
|
6008000808000800 |
|
VISUAL
wHash
|
00ffffe720383030 |
|
VISUAL
colorHash
|
07001019040 |
|
VISUAL
cropResistant
|
6008000808000800 |
The phishing kit is designed to capture user credentials through deceptive input forms or fake login prompts. The harvested credentials are likely transmitted to a remote server controlled by the attacker for further exploitation, such as account takeover or identity theft.
In addition to credentials, the kit targets personal information such as names, addresses, and contact details. This data can be used for identity fraud, phishing, or sold on underground markets.
JavaScript file with no immediately detectable malicious functions but included in a high-risk phishing kit.
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
┌──────────────────────────────────────────────────────────┐
│ 1. INITIAL CONTACT │
│ - Victim receives phishing message │
│ - Message contains link to fake Banking site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE SITE ACCESS │
│ - Victim visits fraudulent Banking page │
│ - Page mimics legitimate login interface │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIAL SUBMISSION │
│ - Victim enters Banking credentials │
│ - Form appears identical to legitimate site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA CAPTURE │
│ - Credentials collected by attacker │
│ - Data prepared for exfiltration │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 5. EXFILTRATION │
│ - Credentials sent via HTTP POST │
│ - Standard form submission to attacker-controlled │
│ destination │
└──────────────────────────────────────────────────────────┘
```
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
┌──────────────────────────────────────────────────────────┐
│ 1. INITIAL CONTACT │
│ - Victim receives phishing message │
│ - Message contains link to fake Banking site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE SITE ACCESS │
│ - Victim visits fraudulent Banking page │
│ - Page mimics legitimate login interface │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIAL SUBMISSION │
│ - Victim enters Banking credentials │
│ - Form appears identical to legitimate site │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA CAPTURE │
│ - Credentials collected by attacker │
│ - Data prepared for exfiltration │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 5. EXFILTRATION │
│ - Credentials sent via HTTP POST │
│ - Standard form submission to attacker-controlled │
│ destination │
└──────────────────────────────────────────────────────────┘
```
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain