Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CC51E060D01AEC335113E1E8ABD0AF9F3587C715C686294967B483AD1AF3C4DDFA662C |
|
CONTENT
ssdeep
|
48:CVNhzJz9uT4NyJbaIncja26CzXAPDQzuTWTdTXMD5yPBLP5u61dA:ALz9u/baIncebCKDQzuTWFXMtsFxXdA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83f67e09890999fc |
|
VISUAL
aHash
|
3f3f3f3f3f3f3f3f |
|
VISUAL
dHash
|
d0ccccddd0d0d0d0 |
|
VISUAL
wHash
|
3f27373f3f0f0000 |
• Threat: Credential harvesting phishing attack
• Target: Outlook users
• Method: Fake login form stealing username and password
• Exfil: Unknown data exfiltration method
• Indicators: Brand impersonation, domain mismatch, non-official domain
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain