Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BA61433590459C7B6252D39873D6FF0461CAC2A6CB0E6C00A2F4D3CCEBE7D20DEA65A5 |
|
CONTENT
ssdeep
|
48:nICYcV+cgNstRemx3YfkljfvHg68SBF0YTgl76214zeVb8JoaTokg:nClckkJfvHg68S0YTgQU4SNqomokg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
de9c732427382537 |
|
VISUAL
aHash
|
98bcbc3c3c7cf8a0 |
|
VISUAL
dHash
|
3038316868a02949 |
|
VISUAL
wHash
|
18bcbc3c3c7cf8a0 |
• Threat: Credential harvesting phishing targeting Adobe PDF users.
• Target: Users needing to view/download PDFs online
• Method: Fake login form designed to steal usernames and passwords.
• Exfil: Likely to a remote server controlled by the attacker (not visible in screenshot).
• Indicators: Domain 'site.applerts.net' does not match 'adobe.com', a login page appears, requesting username and password.
• Risk: HIGH - Immediate risk of credential theft if login information is entered.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain