Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16C91001813853B4F99A552A3D3752E9493E2541EC7324C48A85EE72F1C8814EEC7F9FC |
|
CONTENT
ssdeep
|
96:A3ydpoIL/N+lglAtyHL5ZiNr2t5CLJWfsT3yDSxyHJHAPboRbDY7YoDSZHlfd5D:j2kcRMgc0QD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b29e9a3131dccc99 |
|
VISUAL
aHash
|
dfe7bdc3c3ffefff |
|
VISUAL
dHash
|
394c68049e600800 |
|
VISUAL
wHash
|
1c243c3cc0d0fcfc |
• Threat: Credential harvesting phishing
• Target: Plala users
• Method: Fake login form stealing email and password
• Exfil: Likely to a malicious server (not visible but implied by the phishing nature)
• Indicators: Domain mismatch, brand impersonation
• Risk: HIGH - Credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 5 other scans for this domain