Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E17384B1521DA6BE41C7C2E897770B5A33A9C6D4E723012466FC93B80FEBC96DE27150 |
|
CONTENT
ssdeep
|
1536:u2Rk9FAYNbXIAV8MxXNQpfmpqC6XE2Qjxmp1o7x:u8+6MrIAGMxXNQpfml6XEVjxmHo7x |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e6989866d992c5c7 |
|
VISUAL
aHash
|
c7cfffe3e3e1e3ff |
|
VISUAL
dHash
|
3e3e2c0b4e4f4f12 |
|
VISUAL
wHash
|
838383e3e1e1e3e3 |
|
VISUAL
colorHash
|
07601000040 |
|
VISUAL
cropResistant
|
3e3e2c0b4e4f4f12,801024e46430c000,08223c386031652c,cd4d4dac2f6fad3c |
• Ameaça: Phishing
• Alvo: Usuários do Facebook
• Método: Imitação para roubar dados ou credenciais
• Exfil: Potencialmente varia, com base em formulários e ações ocultas.
• Indicadores: Endereço IP, JS ofuscado, Prometendo um Selo Verificado
• Risco: Alto
The site impersonates Meta/Facebook and tricks users into providing their login credentials or other sensitive information.
The site uses a 'Verified Badge' to lure users, creating a sense of urgency or reward.
Functions: buildAndSend, sendToServer, setForm1
User fills <input name='full-name'> → setForm1() → buildAndSend() → fetch(http://185.199.224.13/server_process_data.php) → exfiltration of user data
User fills <input name='full-name'> → setForm1() → buildAndSend() → fetch(http://185.199.224.13/server_process_data.php) → exfiltration of user data
config_sys.jsbuildAndSendsendToServersetForm1Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain