Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12521C818C00496670142E1C07FD7EA0279C443CBEB192F1098EDC3AD16E2F2DCC6E284 |
|
CONTENT
ssdeep
|
24:hR/CMqc+1KuCL2vHVg345gKeU3+TcaV2tGS1/N/oJAT/tWyP9xAUMMj:TSKvL2ve36ReUOvV2tGOl/8AztxmI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
888936667799d966 |
|
VISUAL
aHash
|
0f071f1f071f0707 |
|
VISUAL
dHash
|
ffeff3b3cdf3ffff |
|
VISUAL
wHash
|
070f1f1f071f0f07 |
|
VISUAL
colorHash
|
07000019040 |
|
VISUAL
cropResistant
|
ffeff3b3cdf3ffff |
• Threat: Credential Phishing
• Target: Microsoft Users
• Method: Impersonation via fake login page
• Exfil: Email address
• Indicators: Domain mismatch, form submission.
• Risk: HIGH
The attacker aims to steal Microsoft account credentials. The fake login form collects email information.
Pages with identical visual appearance (based on perceptual hash)