Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A0514471B004BC734282C6E4B2F16B1B35D7C219CF633A0467FC879E5AF6C89DA19589 |
|
CONTENT
ssdeep
|
48:nkJWhc81C9bK3uBiOylgFxIvJhh6J3ZWADMDwcnpHevk:nBJMKunjFOvvh61X4bpHes |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f6a6cc9999886666 |
|
VISUAL
aHash
|
fffee4f8fce4f8e0 |
|
VISUAL
dHash
|
00004c10084c3000 |
|
VISUAL
wHash
|
fcf8e0f8f8e0e0c0 |
|
VISUAL
colorHash
|
070060000c0 |
|
VISUAL
cropResistant
|
00004c10084c3000,d0243202642428c0 |
⢠Threat: Phishing
⢠Target: Webmail users
⢠Method: Credential harvesting
⢠Exfil: Potentially any endpoint capable of receiving data, especially with obfuscation
⢠Indicators: IPFS hash URL, login form, JavaScript obfuscation
⢠Risk: HIGH
The attacker aims to steal user credentials by presenting a fake login form that mimics the appearance of a webmail service. The user enters their email and password, which is then sent to the attacker.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain