Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10741EFF2D245A93662528AC6FB74B739F6D2014EF9411252C6F116FD03C9E79D042A46 |
|
CONTENT
ssdeep
|
24:kmspWxqnINXwbg35xuOala5Cx65z5PlY8uOXmnFWEK1hxCFbjv+OhoQQC+bjvyh0:CpWxqnm5pwvlFx6zk07m7roT7aoH7ro6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cfb333c73031c698 |
|
VISUAL
aHash
|
ef3c3c003c7c3000 |
|
VISUAL
dHash
|
4969792af165600a |
|
VISUAL
wHash
|
ff3c3c307c7c3c00 |
• Threat: Domain hijacking and redirection to a suspicious URL using Bet365 branding.
• Target: Bet365 users, primarily Chinese-speaking.
• Method: Redirecting traffic through a fraudulent domain to a potentially malicious website (www.e86365.com).
• Exfil: Unknown, likely redirection for phishing or malware distribution.
• Indicators: Domain mismatch, newly registered domain, use of Chinese language, redirection to another potentially malicious domain.
• Risk: HIGH - Potential for credential theft, malware infection, and financial loss.
Pages with identical visual appearance (based on perceptual hash)