Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T157D1967B320062AF0AD312E1B726EB46B382908593421B5854EDD2BE5FD4F1AD9772C9 |
|
CONTENT
ssdeep
|
96:Tu6ptR9c7dujcxSptNdkznMMmIBV9AFVLGAQtk1a9Fj2aGNio7qPG2TJabl/L:ttR9cU1kt7AFVdN8Fj2aSi2KG2Ybt |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cfef30d98e2a2898 |
|
VISUAL
aHash
|
d9f0003c3c080000 |
|
VISUAL
dHash
|
3342516170929ce4 |
|
VISUAL
wHash
|
dbf2a83dfe284814 |
|
VISUAL
colorHash
|
38600018000 |
|
VISUAL
cropResistant
|
3342516170929ce4 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain