Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B02213205045B6B754CBA6E0EF36DB6F678143849A335F0822EDC38E9F9BE4ACD17611 |
|
CONTENT
ssdeep
|
96:Tyu/COuWhcHnBLVM/d4C31xquAQauCUVcC92I/r/O/FY/6/6/6/6/qN8Kq9QM:2PFle1yFwEITWdYSSSSorM |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e47293649c9b8bcc |
|
VISUAL
aHash
|
e3c2ffffe3c3e7ff |
|
VISUAL
dHash
|
8e86ccb1868696b1 |
|
VISUAL
wHash
|
4340fc7fc143435f |
|
VISUAL
colorHash
|
07290008000 |
|
VISUAL
cropResistant
|
8e86ccb1868696b1,1b3b53d34b2a2a33,c082929318596cf0 |
Fake Facebook site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.