Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11922B772D109E67F0213D2E6FB74B720B34B888CF8961256D6ED837C65ABFA1D443618 |
|
CONTENT
ssdeep
|
96:nTJd1Alnl3cTIud6niUrR8tbs56epN6Ol40/mVaDlqaj0LZMzdq6REydaTavg+jG:PIudAiUePyC8lv4RVgdYITq |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
898d7552caca7c74 |
|
VISUAL
aHash
|
181b1b7f7f002400 |
|
VISUAL
dHash
|
f36a32d1d9ccccd2 |
|
VISUAL
wHash
|
1c1b1b7f7f747000 |
|
VISUAL
colorHash
|
300000081c0 |
|
VISUAL
cropResistant
|
ecceda5419d944e8,1029a8d496d649a4,f36a32d1d9ccccd2 |
• Threat: Plesk brand impersonation
• Target: Plesk users
• Method: Using the Plesk logo and branding on a non-Plesk domain
• Exfil: Unknown
• Indicators: Domain mismatch, Plesk branding on a suspicious URL
• Risk: HIGH - Could lead to credential theft or malware installation
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain