Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T156D30AD9B2D6712383B331A850BF620BF17699A5B84C8850F068D8E07E74E99507BF7D |
|
CONTENT
ssdeep
|
1536:72Qq6ge5RKUpVgklsdbuLP/l+0fGzA8gmtasgx/c9Rzzi4yff8qeLvHHEjam7rS9:7Ne8FbGzA81+xRRi1Z182Hzj0O |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cfb331c73131c698 |
|
VISUAL
aHash
|
ef3c3c003c7c3000 |
|
VISUAL
dHash
|
4969792af165600a |
|
VISUAL
wHash
|
ff3c3c307c7c3c00 |
|
VISUAL
colorHash
|
00000000e00 |
|
VISUAL
cropResistant
|
3232b232b6323232,9c7c424c7e480c1e,4969792af165600a |
• Threat: Brand impersonation phishing.
• Target: Bet365 users.
• Method: Displaying Bet365 logo on a fake domain, prompting users to visit an alternate URL.
• Exfil: Unknown. Likely redirection to another phishing or malware distribution site.
• Indicators: Domain mismatch, brand impersonation, alternative URL provided.
• Risk: HIGH - Potential for redirection to credential harvesting or malware distribution.
Pages with identical visual appearance (based on perceptual hash)