Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13AB3DB30C6F65D7BA47C7289EAC8E74151A7C3C3F3866BF6619491EE4A40D05CC43ADA |
|
CONTENT
ssdeep
|
1536:t7ONB8lG0XD48lG0XihUS689wGXsMvkYw:1E8lG0XD48lG0XihUS689wGXsMM |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bb39cec6e63701c0 |
|
VISUAL
aHash
|
0f0f0f0fffffbfbf |
|
VISUAL
dHash
|
3b3bdb3e01592020 |
|
VISUAL
wHash
|
00090903bfbf9f9f |
|
VISUAL
colorHash
|
07e00008000 |
|
VISUAL
cropResistant
|
3b3bdb3e01592020,9e8a9999b2331727,3736333733592b07,1793b79393273b0b,09cdcdcdcdcd4d43 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Found 1 other scan for this domain