Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B091F01813853B4F99A552A3D3752E9493E2541EC7324C58A85EE72F1C8814EEC7F9FC |
|
CONTENT
ssdeep
|
96:A3ydpoIL/N+lglAtyHL5ZiNr2t5CLJWfsT3yDSxyHJHAPboRbDY7YoDSZHlf5D:j2kcRMgc0Qh |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b29e9a3131dccc99 |
|
VISUAL
aHash
|
dfe7bdc3c3ffefff |
|
VISUAL
dHash
|
394c68049e600800 |
|
VISUAL
wHash
|
1c243c3cc0d0fcfc |
• Threat: Credential harvesting phishing attack
• Target: plala (NTT DOCOMO) customers in Japan
• Method: Fake login form to steal email and password
• Exfil: Likely to a remote server controlled by attacker (not visible in screenshot)
• Indicators: Domain mismatch (marutitraders99.com vs. plala's official domain), brand impersonation, login form present
• Risk: HIGH - Immediate credential theft possible
Pages with identical visual appearance (based on perceptual hash)
Found 5 other scans for this domain