Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E5613F717888A87761C283E5AA32BF0BF7D2C194EBC36246D5F0C35E56CAE45ED65204 |
|
CONTENT
ssdeep
|
96:a24jx457LWOljvNPjo6V6RTgKbatH9yUhyAKuKj/B:a2uw7LWOllVhjIAKtB |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ad92968e3e6d92c4 |
|
VISUAL
aHash
|
9f9fcf81939bf3d3 |
|
VISUAL
dHash
|
203a1b3333372733 |
|
VISUAL
wHash
|
9f8fcf818383b183 |
|
VISUAL
colorHash
|
07007000040 |
|
VISUAL
cropResistant
|
203a1b3333372733,d2425b9a9b6929b1,401be4c4d4d00740 |
• Threat: None
• Target: Employees of BUNZL
• Method: Phishing awareness training
• Exfil: None
• Indicators: Legitimate email, no malicious content
• Risk: LOW - Educational content
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain