Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12E8273A2C240553B4193C1C5F924EFBAA2E0038EE75309D6B3FD81B7F34DD255A22A9D |
|
CONTENT
ssdeep
|
384:GCN+2o55ATFN+lPOOb6nV5ATIN+ZobJtl5ATIN+8HPYbAXCu:GOo+kBb6nZtbJ3dgbAyu |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b8c63839c738c6c7 |
|
VISUAL
aHash
|
ffcff7ffff8f8f9f |
|
VISUAL
dHash
|
1a2c2c2c381a1a38 |
|
VISUAL
wHash
|
02878787878f8f8f |
|
VISUAL
colorHash
|
070000081c0 |
|
VISUAL
cropResistant
|
1a2c2c2c381a1a38,279390a829a3ab4b |
• Threat: Impersonation
• Target: Instagram users
• Method: Using a Vercel subdomain to mirror the Instagram interface.
• Exfil: Potentially credentials or other data, if a form was present.
• Indicators: Free hosting, brand logo, UI mimicry.
• Risk: Low
The attacker is attempting to mimic the appearance of Instagram to deceive users.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain