Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19AA3953BE8444017252349F1F7A03F0D5ACAD18FCE878C86ABB887467BD6CE2D85596D |
|
CONTENT
ssdeep
|
1536:XT4P4cfBMg4PjncPjncPjncPjnS4MF/ahRyrM9sP3/HlxElhf:j4P4cf+gIahAgh |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83737e1c3cce6388 |
|
VISUAL
aHash
|
01006b731f1f3931 |
|
VISUAL
dHash
|
6ddacbc7f6ffe3e3 |
|
VISUAL
wHash
|
01006b7b1f1f3f71 |
|
VISUAL
colorHash
|
30000000180 |
|
VISUAL
cropResistant
|
a280c0260d4280a2,6ddacbc7f6ffe3e3 |
• Threat: Brand impersonation phishing attempt.
• Target: Discord users.
• Method: The webpage uses the Discord logo and branding to mislead users.
• Exfil: Unknown, potentially attempting to redirect users to a malicious site for credential harvesting or malware installation.
• Indicators: Domain mismatch (mj-api.kun-ai.com vs. discord.com).
• Risk: HIGH - Users may be tricked into providing sensitive information or downloading malware.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain