Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14EF175A0D4A9DC730163C1D5B7F9AB36A1E9421CC74E0A01A2FC837A9BE7C41FD215A9 |
|
CONTENT
ssdeep
|
96:KuXgQqEpccaIkSb5S3SmUD/q8lfX9YCh59d2BC6CYUqlQM1CfLPIuTMEeqDl7Z1j:hBEi/+8lv9f9dJY7Qk2nDU9Wn3l |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e666cc6722339999 |
|
VISUAL
aHash
|
e7e7ffe7e7e7ffff |
|
VISUAL
dHash
|
0e0c144d0c0c0800 |
|
VISUAL
wHash
|
e3e3e3e32424243c |
|
VISUAL
colorHash
|
07000000c00 |
|
VISUAL
cropResistant
|
0e0c144d0c0c0800 |
• Ameaça: Kit de phishing para roubo de credenciais
• Alvo: Usuários do NAVER na Coreia
• Método: Formulário falso que rouba email e senha
• Exfil: Possível exfiltração de dados via JavaScript ofuscado
• Indicadores: Domínio IPFS, JS ofuscado, URL não coincidente
• Risco: ALTO - Roubo imediato de credenciais
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain