Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T168D2513160F0183B07938581B6655B1A2F9AEB0BCA4E5550BAEC0BD55FF3CA1DE0F62D |
|
CONTENT
ssdeep
|
384:t0YvapaWraDhdQeOfQpQfVTChIqe/tBPuO:ZapaqaDhdQeOfQpQfVuhIqe/t7 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b333c4d41cced54c |
|
VISUAL
aHash
|
ff0f0f0f0f0fffff |
|
VISUAL
dHash
|
d81b5b5b1b980018 |
|
VISUAL
wHash
|
0c0909090f0fffff |
|
VISUAL
colorHash
|
06000000c00 |
|
VISUAL
cropResistant
|
d81b5b5b1b980018,a280a02b2b808080,812929326949a541 |
• Threat: Phishing attack targeting banking credentials.
• Target: Customers of Crédit Agricole.
• Method: A fake login page is used to steal the department code.
• Exfil: Likely to a server controlled by the attacker (unknown).
• Indicators: Unofficial domain, Crédit Agricole branding.
• Risk: HIGH - The phishing site attempts to steal banking information.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain