Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1176110F14584A42902A282D18E32E369D382D474DF730B0B9AE5E75EBBDBFD8CC05079 |
|
CONTENT
ssdeep
|
48:nXjLFTNmTNMitOKsanfI6SfnCw02hse5SnCw02hsesdQ5YpP5hvopBliFOo6wXmb:nTLG4KVZS6l3ONl3/2Ex0ZN |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c958e663b30e35e2 |
|
VISUAL
aHash
|
001818180000ffff |
|
VISUAL
dHash
|
91b2b0b0dbd2e200 |
|
VISUAL
wHash
|
007c5c584848ffff |
|
VISUAL
colorHash
|
0b580001000 |
|
VISUAL
cropResistant
|
d4e0d4d0d0d6dcdc,e0e1000c20150800,1db2b1b0b1dbd2f2 |
• Ameaça: Phishing
• Alvo: Clientes Chase
• Método: Personificação
• Exfil: post.php e tokens Telegram
• Indicadores: Incompatibilidade de domínio, Formulário, Obfuscação
• Risco: Alto
The attacker is using a fake login page that mimics the appearance of Chase to steal user credentials. The form collects username and password.
The presence of a Telegram bot token suggests that data harvested from the form will be sent to the attacker via a Telegram bot.
| ID | Portuguese | English | Trigger |
|---|---|---|---|
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain