Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10BA1121C12853B4F999952A2D3752E94D3E1941EC7324C58A85EE72F1C8814EEC7F9FC |
|
CONTENT
ssdeep
|
96:A3ydpoIL/N+lglAtyHL5ZiNrft5CLJWfsT3yDSxyHJHAPboRbDv72oDSZHlfd5D:j2bcRM3a0QD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b2969b3131dccc99 |
|
VISUAL
aHash
|
dfe7bdc3c3ffefff |
|
VISUAL
dHash
|
394c68049e600800 |
|
VISUAL
wHash
|
1f273f3f03130303 |
|
VISUAL
colorHash
|
07018000600 |
|
VISUAL
cropResistant
|
394c68049e600800 |
โข Threat: Phishing
โข Target: plala users
โข Method: Credential harvesting via fake login page.
โข Exfil: cgi-binsso/pf/agent_sso.php
โข Indicators: Domain mismatch, obfuscated javascript.
โข Risk: High
The attacker creates a fake login page that mimics the plala login. Users are tricked into entering their credentials, which are then harvested.
Pages with identical visual appearance (based on perceptual hash)