Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F55361B3A0800427125309D1A6E47F1EA2E7D10FDE579893A6B8434A7BD2C95EC2DF7D |
|
CONTENT
ssdeep
|
768:2jgD4I++ukABIS8SQJlQ5ZNlylVXnoloYokoAoXonojoeBXwg4Ym2Xj2c2QAI3oG:3Q4PQ5ZuDtH |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ef59d1c71d189066 |
|
VISUAL
aHash
|
ffe1819981e7c3ff |
|
VISUAL
dHash
|
b64b3333454f2bcc |
|
VISUAL
wHash
|
fea1818181e781ff |
|
VISUAL
colorHash
|
06006000000 |
|
VISUAL
cropResistant
|
b64b3333454f2bcc,f9d0732b8b8949d9 |
• Threat: Phishing targeting Discord users
• Target: Discord users
• Method: Impersonating the Discord website to potentially steal login credentials or other sensitive information.
• Exfil: The presence of obfuscation suggests data exfiltration is likely.
• Indicators: Domain mismatch (discord.imms.top vs. discord.com), obfuscated JavaScript
• Risk: HIGH - Potential for credential theft and account compromise.
Found 5 other scans for this domain