Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10BD1EDB29408AD3B5363C3D9A6B2A34FF782D185D987058AE1F6D30E1FD3DA4CD06252 |
|
CONTENT
ssdeep
|
96:amY7H+ZnoGyPfmGjZz2Kh8h4TrwsmzClPjmUbTuGW/5NrGozuvcx/gZ:amYb+CFuOdPQiwpbr9/S |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fe7e1e81a1616d84 |
|
VISUAL
aHash
|
809c8080ffffffff |
|
VISUAL
dHash
|
0a38200338202024 |
|
VISUAL
wHash
|
80808080fffff3f3 |
• Threat: Brand impersonation phishing
• Target: Instagram users
• Method: Impersonating Instagram on a free hosting platform to potentially distribute malware or harvest credentials.
• Exfil: Unknown, but potentially redirects to malicious sites or harvests data.
• Indicators: Fake Instagram page, blogspot.com.es subdomain, no clear functionality.
• Risk: HIGH - Potential for malware distribution or credential harvesting.
Pages with identical visual appearance (based on perceptual hash)