Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15FB10E767145AA3E559783E2F322373A23A282C5DB07120894FAC3691FD9D0DDC3B9D8 |
|
CONTENT
ssdeep
|
48:TOyJ/Z5wsIhS4p63w/eJ/Ee8/FKzio/eJ/d3UJ9mI5SAtTdA2idwW6VuB6sdB6OU:TZGS7hCeaKzi5n3E9mI5rgwpsp6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c33330962eb81ee7 |
|
VISUAL
aHash
|
070860207c7c7e00 |
|
VISUAL
dHash
|
8dd0c163c0e0d4d3 |
|
VISUAL
wHash
|
8738e0b07cfe7f00 |
|
VISUAL
colorHash
|
39401010000 |
|
VISUAL
cropResistant
|
8dd0c163c0e0d4d3 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.