Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1552132F05504A81E60E683C5BAB2B31E12E29290EF534D486BD86B9C0FDEE94D9542E9 |
|
CONTENT
ssdeep
|
24:50kiHb6/QB0xi3G5wrspMDr7BvzkIAtjSg7B0S7ZEPlIqyXv1DqTF:qki7GxTwIpMrRoTBSgt0StsIqE1DqJ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e4e4e44c6c6c6c79 |
|
VISUAL
aHash
|
e766660000000000 |
|
VISUAL
dHash
|
8eccd40210100000 |
|
VISUAL
wHash
|
ffefe7e718180000 |
|
VISUAL
colorHash
|
30007000000 |
|
VISUAL
cropResistant
|
8eccd40210100000 |
• Threat: Brand impersonation phishing
• Target: Roblox users
• Method: Fake website to trick users into thinking it's Roblox
• Exfil: Unknown - but likely credential harvesting if the website had forms
• Indicators: Domain mismatch (rroblox.com.es vs roblox.com), obfuscated JavaScript, domain age unknown but likely recent
• Risk: HIGH - Potential for credential theft or malware installation
Pages with identical visual appearance (based on perceptual hash)