Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C0224F33A500CC6A4D9B95CCF2C0A649451EC346FB3148CAB1A081FFBBD0DF169AA79D |
|
CONTENT
ssdeep
|
192:fpkHzjYcLcQchVAy4RGJaiMcnthWeNWbZfMmUU8VCo3UVK:fcLcQchVAy4QETfMmUFCo3mK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b13133cececec688 |
|
VISUAL
aHash
|
c3c3c3ffffffffff |
|
VISUAL
dHash
|
0c9e960c30000001 |
|
VISUAL
wHash
|
c0c0c0f8f0f0f3f3 |
|
VISUAL
colorHash
|
07200030000 |
|
VISUAL
cropResistant
|
0c9e960c30000001,8080a2a2a280a280,7233eee2ecf2b24c |
• Threat: Phishing
• Target: Dakota Central users
• Method: Credential Harvesting via login form
• Exfil: Potentially unknown, form submission data
• Indicators: Framer.app, login form, JavaScript obfuscation
• Risk: HIGH
The attacker is attempting to steal user credentials (email and password) by presenting a fake login form. The information entered will be sent to the attacker.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain