Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15562506190A05C3B429393C1B6359B1A37DAC74ACA8B574197F8839A1FF6C64DC0F72E |
|
CONTENT
ssdeep
|
192:tMwwxkMaNkIZI7H1S6QrQHQPEihNytR0xMv0e/xVSYw0L12:tMwJk7H1S6QrQHQPZe0xM8e/fPwO12 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b333c4d41cced54c |
|
VISUAL
aHash
|
ff0f0f0f0f0fffff |
|
VISUAL
dHash
|
d81b5b5b1b980018 |
|
VISUAL
wHash
|
0c0909090f0fffff |
|
VISUAL
colorHash
|
06000000c00 |
|
VISUAL
cropResistant
|
d81b5b5b1b980018,a280a02b2b808080,812929326949a541 |
• Threat: Credential harvesting phishing targeting banking customers
• Target: Crédit Agricole customers
• Method: Fake login form asking for department code
• Exfil: Unknown (likely designed to capture the input)
• Indicators: Domain mismatch, dynamic DNS, brand impersonation
• Risk: HIGH - immediate data theft
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain