Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1282371F19240A9AF8561C2DED3737FC8D7C2508AE7928C85E9A4971D09C9C93DD172BC |
|
CONTENT
ssdeep
|
768:n7HZ6DfXLnQVTwBa4AVYG1umlo8xa/CRz:nrZCfawRG1umloez |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cdb0b2b3c5ce4d0c |
|
VISUAL
aHash
|
ffff103010383030 |
|
VISUAL
dHash
|
0034726272626262 |
|
VISUAL
wHash
|
ffff303038383838 |
|
VISUAL
colorHash
|
031c0000000 |
|
VISUAL
cropResistant
|
0034726272626262 |
โข Threat: Phishing
โข Target: Yahoo users
โข Method: Credential Harvesting via fake login form
โข Exfil: http://free.mailjol.net/allforms.php
โข Indicators: Domain, Obfuscation, JavaScript form submission.
โข Risk: High
The site attempts to steal Yahoo user credentials by displaying what *appears* to be a Yahoo login form. Users enter their credentials, which are then sent to a malicious server.
The website employs Javascript obfuscation to conceal the phishing activities from detection.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain