Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A6A3953BE8444017252349F1F7A03F0D5ACAD18FCE878C86ABB887467BD6CE2D85596D |
|
CONTENT
ssdeep
|
1536:XT4PVyfBMg7PjncPjncPjncPjnS4MF/ahRyrM9sP3/HlxEltf:j4PVyf+gzahAgF |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83737e1c3cce6388 |
|
VISUAL
aHash
|
01006b731f1f3931 |
|
VISUAL
dHash
|
6ddacbc7f6ffe3e3 |
|
VISUAL
wHash
|
01006b7b1f1f3f71 |
|
VISUAL
colorHash
|
30000000180 |
|
VISUAL
cropResistant
|
a280c0260d4280a2,6ddacbc7f6ffe3e3 |
⢠Threat: Discord phishing targeting user accounts.
⢠Target: Discord users.
⢠Method: Website impersonates Discord to collect user data and possibly redirect to a fake login page.
⢠Exfil: The presence of obfuscated JavaScript suggests exfiltration is likely, destination unknown.
⢠Indicators: Mismatched domain, use of obfuscated JavaScript, presence of forms.
⢠Risk: HIGH - Potential for account compromise and data theft.
Pages with identical visual appearance (based on perceptual hash)