Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16EF133366640697705D382E97B766B1F33D3C182CB032B9926F9C34D8FE6E45CD22286 |
|
CONTENT
ssdeep
|
96:nPQFbhfX8VKnXq9mcs1F2taDjj28GNi35fXMrHqY3cQF9:oFbJQKa9mcsbPj28Si3hcLf3hF9 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
96cd3670c38f3934 |
|
VISUAL
aHash
|
20181b7d78000626 |
|
VISUAL
dHash
|
6d72b2f0d5974ccc |
|
VISUAL
wHash
|
b5bc1f7fe3000626 |
|
VISUAL
colorHash
|
39601008000 |
|
VISUAL
cropResistant
|
100000d0d0000040,6d72b2f0d5974ccc |
• Threat: Phishing
• Target: Netflix users
• Method: Impersonation to steal credentials
• Exfil: Unknown, likely to a database
• Indicators: Free hosting, brand logo on suspicious domain, email form.
• Risk: High
The attacker creates a convincing replica of the Netflix website to trick users into entering their login credentials.
The attacker uses the Netflix branding to create a sense of trust and legitimacy, persuading users to provide their information.
Found 1 other scan for this domain