Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B7218B68E048893747A3D1D9A5B1A35F3AA0878CD7170B055FF8039926DFEA8CD021D9 |
|
CONTENT
ssdeep
|
24:n/nTxVx/cIgDETsCVlWJnPaNPALc756Fl+Nit8zZrAd:ntf/cIgwYCvA4PW8CMiN |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9b4be68cd933c88c |
|
VISUAL
aHash
|
180018081d1f1fbf |
|
VISUAL
dHash
|
7161717b33717d79 |
|
VISUAL
wHash
|
391818081f1f1fff |
|
VISUAL
colorHash
|
07000088041 |
|
VISUAL
cropResistant
|
7161717b33717d79 |
• Threat: Credential harvesting phishing
• Target: Microsoft users (potentially enterprise)
• Method: Fake security check redirecting to a malicious domain to harvest credentials if a form were present
• Exfil: Data exfiltration likely via obfuscated Javascript techniques.
• Indicators: Unofficial r2.dev domain, brand impersonation, obfuscated JavaScript ('atob', 'base64_strings')
• Risk: HIGH - Immediate risk of credential compromise
Pages with identical visual appearance (based on perceptual hash)
Found 6 other scans for this domain