Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16C31681251055D976083F2A4F1E5EF6F30D982A283160E3857B0939B3DCEDFE8A656C9 |
|
CONTENT
ssdeep
|
24:n/CiDDfT1FdVyWGvr1Mm8KH5QzrZLBvQLDzrZL8NNEenNabRx0R7Ew596RUK:np/yzv+N5BvCD584IWRx02496Rv |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bbc8473938e65998 |
|
VISUAL
aHash
|
ffffffc78e868680 |
|
VISUAL
dHash
|
003070ac38184c1c |
|
VISUAL
wHash
|
fefefec68e840400 |
|
VISUAL
colorHash
|
06007000080 |
|
VISUAL
cropResistant
|
003070ac38184c1c,4501253131710155 |
• Threat: Credential harvesting phishing kit
• Target: Users of Microsoft Excel
• Method: Fake login form requesting email and password
• Exfil: Unknown data exfiltration point
• Indicators: Domain mismatch (s3.amazonaws.com), impersonation of Microsoft Excel, presence of login form
• Risk: HIGH - Immediate risk of credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 5 other scans for this domain