Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CF724310D904891D01DF8EC5E1736A5812F803AEC71304D8FE60ABFAA6EF878C777669 |
|
CONTENT
ssdeep
|
192:Qp+XBSw+0LrVS3dNMAAzvE2v7ar7lrCmr0s9QOvqHKxrZWmWkEcGMkRY/zO2Yzoc:uaO8TAwRm92U1ROEXUac7d |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3cecc6699996618 |
|
VISUAL
aHash
|
ffffe7efc3c3efff |
|
VISUAL
dHash
|
28280c584d4d1c38 |
|
VISUAL
wHash
|
fce4c4ccc0c0c4cc |
|
VISUAL
colorHash
|
070030000c0 |
|
VISUAL
cropResistant
|
28280c584d4d1c38,24a42936165c2c08 |
• Threat: DMCA takedown phishing scam
• Target: Meta Business Manager and Ad account users
• Method: Fake DMCA takedown notification to scare users into verifying accounts
• Exfil: Likely credential harvesting through a fake login page after clicking the button. No specific data exfiltration target identified.
• Indicators: Non-matching IP address domain, urgency tactics, obfuscated Javascript.
• Risk: HIGH - Potential account compromise and data theft.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain