Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BE41C071100C7C3F4987EBF88BB1A78AA3D9D605C86B160661F8E34C5EC6E52DD806DC |
|
CONTENT
ssdeep
|
48:xz4DKxXJcUfos/HSLtTeA6Bs4adBadxf2:xXJlfLq6+dwdxf2 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3e2cc1d76e21919 |
|
VISUAL
aHash
|
ffffffe70000ffff |
|
VISUAL
dHash
|
94294c0d08180008 |
|
VISUAL
wHash
|
60e6e4e40000ffff |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
8c102848304d4d30,0000000000000000,00100c32b2b20c20,08831a1a1a180800 |
• Threat: Phishing
• Target: DKB customers
• Method: Domain spoofing and credential harvesting
• Exfil: hot/hakona.php
• Indicators: Mismatched domain, suspicious form action.
• Risk: HIGH
The attacker presents a fake login page designed to collect the user's DKB login credentials.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain