Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DCD183E8AA3CB63D140F87ACCB6EF681235FA0EDF3170564638E56B10587E6CE946C54 |
|
CONTENT
ssdeep
|
96:e35KFSe0BlTSc/Q04JvN/Un4jFSe0BlTSc/Q04JWatPTOYuFA9ed/WqtuC:ZAN3J4JvBAN3J4J/iVW9eJW4uC |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cccc3333cccc6633 |
|
VISUAL
aHash
|
0000181818180000 |
|
VISUAL
dHash
|
100c32b2b2320c10 |
|
VISUAL
wHash
|
3c3c3c3c1c1c3030 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
100c32b2b2320c10 |
• Threat: Captcha bypass attempt with potential data collection.
• Target: VK (VKontakte) users.
• Method: Displaying a fake 'are you a robot' check to potentially harvest data or bypass security measures.
• Exfil: Unknown, but likely involves data exfiltration through obfuscated Javascript.
• Indicators: Uncharacteristic subdomain, obfuscated Javascript using fromCharCode and unescape, the presence of an unusual hash at the bottom of the popup.
• Risk: MEDIUM - Data collection or account compromise if bypassed.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain