Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BAA3953BE8444017252349F1F7A07F0D5ACAD18FCE878C86ABB887463BD6CE2D85596D |
|
CONTENT
ssdeep
|
1536:XT4PdyfBMgKPjncPjncPjncPjnS4MF/ahRyrM9sP3/HlxEltf:j4Pdyf+guahAgF |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83737e1c3cce6388 |
|
VISUAL
aHash
|
01006b731f1f3931 |
|
VISUAL
dHash
|
6ddacbc7f6ffe3e3 |
|
VISUAL
wHash
|
01006b7b1f1f3f71 |
|
VISUAL
colorHash
|
30000000180 |
|
VISUAL
cropResistant
|
a280c0260d4280a2,6ddacbc7f6ffe3e3 |
• Threat: Discord phishing targeting user accounts.
• Target: Discord users.
• Method: The phishing site uses Discord's branding to trick users into entering their credentials, which are then stolen.
• Exfil: Data is likely exfiltrated via a custom API.
• Indicators: Domain mismatch (chatgpt0005.eu.org), obfuscated JavaScript, and Discord branding.
• Risk: HIGH - Real-time credential theft.
Pages with identical visual appearance (based on perceptual hash)