Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E861FC305884867B429683E1B7307F4FB7858654EB93CA8686F1C78EC7DAD45EE71604 |
|
CONTENT
ssdeep
|
48:c+TNXgibJMK2zQq/10GNSehNvwKMnzA4gkDcsNE/6D1I1E9JRarAKTmd7JX0rNc0:aIkQq/uGNu/zAHkDc9M6WvQMKTmdFZ0 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ad9296cc3a6d92c6 |
|
VISUAL
aHash
|
9fdf8381df9bb1df |
|
VISUAL
dHash
|
383c3b3333372737 |
|
VISUAL
wHash
|
9fc78381839b918f |
|
VISUAL
colorHash
|
07007000000 |
|
VISUAL
cropResistant
|
383c3b3333372737,c6472bdad2292995,4413ecc4d4c80340 |
• Threat: Phishing awareness simulation
• Target: CYMI employees in Brazil
• Method: Simulated phishing email to educate users
• Exfil: No exfiltration - it's a training exercise
• Indicators: Email from CYMI about a phishing simulation
• Risk: LOW - Educational exercise, no real threat
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain