Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10ED11E719608AD3753A3C3EDB7B1A34BB782C284C987064A91F6D34E1FD3DA0DC12256 |
|
CONTENT
ssdeep
|
96:fTS3/K9MHaZnoGyPFmGjZz//6/HBJSywkLNmzClPiUbTuGWKrGo+1u8cEl8P:fT6aCFMO8fSYLqTsrks |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fe7e5ca161616984 |
|
VISUAL
aHash
|
809c8080ffffffff |
|
VISUAL
dHash
|
0b30340320202024 |
|
VISUAL
wHash
|
80808080fcfcfcf4 |
|
VISUAL
colorHash
|
070020001c0 |
|
VISUAL
cropResistant
|
0b30340320202024 |
• Threat: Impersonation
• Target: Telstra customers
• Method: Blogspot used for a fake Telstra site.
• Exfil: https://telstra243.blogspot.com/search (form action)
• Indicators: Unrelated content and 'Aucun article disponible.' in french.
• Risk: Moderate
The site likely aims to trick visitors into entering their Telstra login credentials through a fake login form or social engineering.
Pages with identical visual appearance (based on perceptual hash)