Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CC51EF3460149A3753D3C6C07AF1AB1F76C68282DE131B035AF5831E9BEBF68CD552A9 |
|
CONTENT
ssdeep
|
48:TGupZy7+L88ybcq+U/JGIxqIYXsMhcrZAV9CRttUuYsGf8iYv5i6:TGuewZU/JZvTMhcr6/+HUtsGf8Jv |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ca3cb4c3c74b383c |
|
VISUAL
aHash
|
fa9899f9f8f9f9fe |
|
VISUAL
dHash
|
3031314303030304 |
|
VISUAL
wHash
|
f89890f0f0f0f8f8 |
|
VISUAL
colorHash
|
07400010010 |
|
VISUAL
cropResistant
|
3031314303030304,00002432b2320c10 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.
| ID | Portuguese | English | Trigger |
|---|---|---|---|
Pages with identical visual appearance (based on perceptual hash)