Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T106211270B009E91B4262C2C4F7B0A61E3F81C399C7483D1176DFA29A5AF6D59DC570D9 |
|
CONTENT
ssdeep
|
12:nwMy7FU5GKNJdoRG7wvG6qqJADAtJD1G7BzAewPrikkWCFwo7Qa59SCIUe/VGf42:n/CCdo9vWWh7DmKvUuTkvOPwyoTp |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8d0da70f8d0da70f |
|
VISUAL
aHash
|
ff000018180000ff |
|
VISUAL
dHash
|
800080b2b204004c |
|
VISUAL
wHash
|
ff0f08181800cbff |
|
VISUAL
colorHash
|
07000608018 |
|
VISUAL
cropResistant
|
800080b2b204004c |
• Threat: Suspicious file download request on a non-official domain.
• Target: DocuSign users.
• Method: Prompts user to verify humanity and click a button to view a file.
• Exfil: Likely attempts to download a file that could contain malware.
• Indicators: Non-official domain (ipfs.io) used for a DocuSign-related action.
• Risk: LOW - Potential for malware download, proceed with caution.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain