Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13AB419A8F2B0640D43A7017A617F354473B6691EA56944287679CCEAB8E494C323FFFC |
|
CONTENT
ssdeep
|
6144:RRPyUDP0SutXn0HphBXi+ZcWW3DjwePN8wXdB3q7lBWq5Ltrfg8vlJ:OOcl3d0Bt5CMX |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f722dd88d988dd88 |
|
VISUAL
aHash
|
e7e7e7e7fffffffe |
|
VISUAL
dHash
|
0d4d4d4d0c000000 |
|
VISUAL
wHash
|
00e1202081fffffe |
|
VISUAL
colorHash
|
070000000cb |
|
VISUAL
cropResistant
|
0d4d4d4d0c000000,44cccccc8c4d06e8 |
• Threat: Phishing
• Target: BT/EE customers
• Method: Impersonation through a fake update page.
• Exfil: Not available from screenshot.
• Indicators: Free Hosting, Brand Logo, JavaScript.
• Risk: High
The attacker likely aims to steal user credentials by mimicking an official BT/EE communication, luring victims to enter their login details.
The button could lead to a site which asks for more information to 'verify' the user, leading to a trojan download.
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain