Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T107E1B91392863331068B457BFB0793DDF72140D4D7261AC5A47E411EB6A86C9C93BFD9 |
|
CONTENT
ssdeep
|
96:TgqUys/P7EXGv+Py6HrGFMuWZK9814fl93v+DGd4xKxByUF4niLyj8Cr/Vaml4Et:7s/P7ES+PdP681WmynF4jTt65sV+K |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c7999989c98acf31 |
|
VISUAL
aHash
|
3c383c3c38383838 |
|
VISUAL
dHash
|
7140496140614941 |
|
VISUAL
wHash
|
3c3c3c3c3c3c3c3c |
|
VISUAL
colorHash
|
38006000440 |
|
VISUAL
cropResistant
|
7140496140614941 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain