Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12E222233B600CD2A4DAB559CF2C09649451EC346FB3148CAB1A091FFBBC0DF065A97AE |
|
CONTENT
ssdeep
|
192:aAkHzzYcLcYchro/y4RGJaiMcnthWeNWbZfMmUU8VCo9H:5cLcYchrEy4QETfMmUFCop |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b13133cececec688 |
|
VISUAL
aHash
|
c3c3c3ffffffffff |
|
VISUAL
dHash
|
0c9e960c30000001 |
|
VISUAL
wHash
|
0000000400000303 |
|
VISUAL
colorHash
|
07000000000 |
|
VISUAL
cropResistant
|
0c9e960c30000001,0000000000000000,8000000000000000,61217e726e72314d |
โข Threat: Credential Phishing
โข Target: Twin Valley users
โข Method: Impersonation via login form on Framer.app.
โข Exfil: Potentially via JavaScript obfuscation.
โข Indicators: Framer.app hosting, login form.
โข Risk: High
The attacker is attempting to steal user credentials by mimicking the Twin Valley login page on Framer.app and presenting an email/password form.
JavaScript code has been obfuscated to hide its intent. This might involve data exfiltration or other malicious activities.
Pages with identical visual appearance (based on perceptual hash)