Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17061533190459C7A6252D3A8B3D6FF0465CEC1A6C70A6800A3F4E3CDE7E7D10DAA659A |
|
CONTENT
ssdeep
|
48:nICYWVBcWzcYRlUxv8Xhj1fvHgoaZ6pB+OTgl162phmzeVb8JoaTokg:n7JLREAhRfvHgoaZ6KOTg2ywSNqomokg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
de9c73102738253f |
|
VISUAL
aHash
|
98bcbc3c3c7cf8a0 |
|
VISUAL
dHash
|
3038316868a02949 |
|
VISUAL
wHash
|
18bcbc3c3c7cf8a0 |
|
VISUAL
colorHash
|
0fc00018000 |
|
VISUAL
cropResistant
|
3cdcdc9909e9ddde,bc3438b6f4d43464,3038316868a02949,8b8b8383838387e7 |
• Threat: Credential harvesting phishing targeting Adobe PDF users.
• Target: Users attempting to view or download PDF files online.
• Method: Fake login form to steal username and password to access PDF files.
• Exfil: Unknown, likely to a malicious server via the /site/submit form action.
• Indicators: Domain mismatch (payment.319447.com vs adobe.com), login form request, general domain, claims of viewing PDF files.
• Risk: HIGH - Potential credential theft.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain