Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T155F10E32944CEC3723231FD17592B714E2D6C76ECA421A10D6B9439E0FEBED2E446657 |
|
CONTENT
ssdeep
|
192:8HVJikYMzvUAZ6C3CYEQctxdUAKe8I+jKkrAr+jg1rA+j3rrALdv:+VJikp8AIe7/AKe8I+jKkrAijg1rA+j+ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cc666699333133b3 |
|
VISUAL
aHash
|
0010001818181800 |
|
VISUAL
dHash
|
70624cb2b2b2b24c |
|
VISUAL
wHash
|
001020381c1c1c1c |
|
VISUAL
colorHash
|
070060000c0 |
|
VISUAL
cropResistant
|
98a6b2803336b8b8,70624cb2b2b2b24c |
โข Threat: Credential Phishing
โข Target: BERO HOST users
โข Method: Impersonation via login page.
โข Exfil: Obfuscated JS might indicate where stolen credentials go.
โข Indicators: Forms, Obfuscation, JS form submission.
โข Risk: HIGH
The site presents a login form to steal user credentials. The obfuscated JavaScript will likely send those credentials to a remote server.
Pages with identical visual appearance (based on perceptual hash)
Found 8 other scans for this domain