Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19F3294F24054612F119BC2CB8F29576C33FA61FAE6B60302A7E9838DDBDEC91DD06449 |
|
CONTENT
ssdeep
|
192:cWoDdlWdlKI6z40AAAqRZ6a76BK61dluBdl1tdlnr2Qf4K40W1AAqRZ6WmXLIlT2:0dlWdlF0pRZ6a7A/1dluBdl1tdlnr2fB |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9393ac6c65929e96 |
|
VISUAL
aHash
|
7e6c2c6c20181000 |
|
VISUAL
dHash
|
f4c8c8d8d27070f0 |
|
VISUAL
wHash
|
ff7e7c6c003c3818 |
|
VISUAL
colorHash
|
31c00008000 |
|
VISUAL
cropResistant
|
b3a7e4c0908ce183,703034b0e3cff03c,f4c8c8d8d27070f0 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain