Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19BA3A63BE8444017252349F1F7A07F0D5ACAD18FCE878C86ABB887463BD6CE2D85596D |
|
CONTENT
ssdeep
|
1536:XT4PJ5zfBMgmPjncPjncPjncPjnS4MF/ahRyrM9sP3/HlxElnf:j4PJ5zf+gKahAgf |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83737e1c3cce6388 |
|
VISUAL
aHash
|
01006b731f1f3931 |
|
VISUAL
dHash
|
6ddacbc7f6ffe3e3 |
|
VISUAL
wHash
|
01006b7b1f1f3f71 |
|
VISUAL
colorHash
|
30000000180 |
|
VISUAL
cropResistant
|
a280c0260d4280a2,6ddacbc7f6ffe3e3 |
• Threat: Brand impersonation phishing.
• Target: Discord users.
• Method: Uses Discord's logo and branding to trick users into believing it is a legitimate Discord website.
• Exfil: Unknown, likely targets credentials or asks users to download a malicious application.
• Indicators: Mismatched domain, Discord branding.
• Risk: HIGH - Users might trust the site and enter their credentials or download malicious software.
Pages with identical visual appearance (based on perceptual hash)