Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1176110F14584A42902A282D18E32E369D382D474DF730B0B9AE5E75EBBDBFD8CC05079 |
|
CONTENT
ssdeep
|
48:nXjLFTNmTNMitOKsanfI6SfnCw02hse5SnCw02hsesdQ5YpP5hvopBliFOo6wXmb:nTLG4KVZS6l3ONl3/2Ex0ZN |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c958e663b30e35e2 |
|
VISUAL
aHash
|
001818180000ffff |
|
VISUAL
dHash
|
91b2b0b0dbd2e200 |
|
VISUAL
wHash
|
007c5c584848ffff |
|
VISUAL
colorHash
|
0b580001000 |
|
VISUAL
cropResistant
|
d4e0d4d0d0d6dcdc,e0e1000c20150800,1db2b1b0b1dbd2f2 |
โข Threat: Phishing
โข Target: Chase customers
โข Method: Impersonation and credential harvesting
โข Exfil: Data posted to post.php, potentially via Telegram bot
โข Indicators: Domain mismatch, login form, visual imitation
โข Risk: High
The attacker creates a fake login page that mimics the appearance of Chase's login. The user enters their credentials, which are then harvested and sent to the attacker.
Data is submitted to a 'post.php' script, allowing the attacker to capture the victim's data.
| ID | Portuguese | English | Trigger |
|---|---|---|---|
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain