Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13E63BF2AA3511D26405382CDE6A16BD65362C789DE5A0B0403B8C37B7CFFA78FD215ED |
|
CONTENT
ssdeep
|
1536:Q9vn9r3c+s4ii6DWFrToePqu2tjERdivhGd40Gzsfk+Ifc+b:QdW+RTrUHur2ZIzM/c+b |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cbd33c33762c5522 |
|
VISUAL
aHash
|
283c3c3c3c3c0101 |
|
VISUAL
dHash
|
c9c9e9e1c9c9b36b |
|
VISUAL
wHash
|
3c7c7c7c7c7c0301 |
|
VISUAL
colorHash
|
07000018180 |
|
VISUAL
cropResistant
|
9393d68e83139b93,b2ac86d6aa2acc8a,c9c9e9e1c9c9b36b,5029e4e0234de8e2,981863585a4a5a4a |
• Threat: Phishing
• Target: Windows users
• Method: Impersonation through fake security alert.
• Exfil: Phone number to a malicious actor. Obfuscated JS code to deliver payload
• Indicators: Urgent alert, error code, phone number, Domain age, obfuscation.
• Risk: HIGH
The attackers are impersonating a Windows Security alert to trick the user into calling a fake support number.
The attacker uses a combination of fear and urgency to prompt the user to make a call.
Pages with identical visual appearance (based on perceptual hash)