Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DF21E021583E897779C28AFC71D9B21D22DAC606CF530D1256FA83ED1AD2E9FCC65284 |
|
CONTENT
ssdeep
|
24:iCOgecuDfjYHMC117rV/vt/iU8PDNbNxPFYT0zmaHWhLS:McCbYp17dBiU0NbjPFYT0zmaQG |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
99cc663399cc6633 |
|
VISUAL
aHash
|
0000181818000000 |
|
VISUAL
dHash
|
200c32b2b2281400 |
|
VISUAL
wHash
|
0f0f1b1b1b1b0303 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
200c32b2b2281400 |
• Threat: Credential harvesting phishing kit
• Target: Users of webmail providers in Korea
• Method: Fake login form stealing email and password
• Exfil: Unknown, potentially custom API or Telegram
• Indicators: URL shortener, obfuscated JavaScript, forms detected
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain