Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F27384B1521DA6BE41C7C2E897770B5A33A9C6D4E723012466FC93B80FEBC96DE27150 |
|
CONTENT
ssdeep
|
1536:uyRkLFAYNbXIoY8MxXNQpfmpqC6XE2Qjxmp1o7x:uYE6MrIo3MxXNQpfml6XEVjxmHo7x |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e6989866d992c5c7 |
|
VISUAL
aHash
|
c7cfffe3e3e1e3ff |
|
VISUAL
dHash
|
3e3e2c0b4e4f4f12 |
|
VISUAL
wHash
|
838383e3e1e1e3e3 |
• Threat: Brand impersonation phishing
• Target: Meta users
• Method: Displaying fake 'Meta Verified' badge message with non-Meta URL
• Exfil: Unknown, likely attempts to deceive users into taking actions on the fake page.
• Indicators: IP address domain, Meta logo and branding mismatch.
• Risk: HIGH - Users could be tricked into providing information or performing actions on a fake site.
Pages with identical visual appearance (based on perceptual hash)