Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D52372F19240A9AF856182DED3737FC8D7C2508AEB928C85E9A4D71D09C9C93DD172BC |
|
CONTENT
ssdeep
|
768:t7HZ6DfXJnFV2RBa45V7G1umloQxBgCRz:trZCfARhG1umlo+z |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cdb0b2b3c5ce4d0c |
|
VISUAL
aHash
|
ffff103010383030 |
|
VISUAL
dHash
|
0034726272626262 |
|
VISUAL
wHash
|
ffff303038383838 |
|
VISUAL
colorHash
|
031c0000000 |
|
VISUAL
cropResistant
|
0034726272626262 |
โข Threat: Phishing
โข Target: Yahoo users
โข Method: Malicious blog with form.
โข Exfil: http://free.mailjol.net/allforms.php
โข Indicators: Unusual domain, obfuscated code, JavaScript form submission, suspicious form action.
โข Risk: High
The website presents a login form designed to mimic Yahoo's login page. When a user enters their credentials, the form submits the information to a remote server controlled by the attackers.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain