Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12A0274B28404542B121281C97667FB4E60839346CF761851A7D543AFBAEEAF0DCBB397 |
|
CONTENT
ssdeep
|
192:BSiS7oiwQcYIhFB+unhnzgJ3OUz3NXTX2a:BSiS7oiwQ8f9UOU3NXTXB |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f46d1319665e5313 |
|
VISUAL
aHash
|
00c3c3c3d3ffffe7 |
|
VISUAL
dHash
|
1616aaae16080e4d |
|
VISUAL
wHash
|
00c3c3c3c3c7cbe7 |
|
VISUAL
colorHash
|
06040006080 |
|
VISUAL
cropResistant
|
9616aaa616080e4d,0000343430303410 |
• Threat: Phishing
• Target: DANA users
• Method: Impersonation through a shortened URL, forms and JavaScript obfuscation
• Exfil: login.php (likely)
• Indicators: URL Shortener, Forms, Obfuscation
• Risk: High
The site uses a shortened URL to mask the actual destination and tricks the user into entering their login credentials into the form, which will be sent to the malicious actor.
The site presents a page that seems legitimate at first glance to lure the user into the trap.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain