Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T161C1FC2AB75C37B4064503AA66D64BF9F71748BCD2245765A9ADC00CB3853CC8BE74CA |
|
CONTENT
ssdeep
|
96:TLZlUKPdF8ZEI6cCbw83xLhjdGRS5a4po/mZwQ/3hAEg:nZlU8d20s83ZzQ8mM3O |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ab1cb13e732e611c |
|
VISUAL
aHash
|
0139312161e1f1e1 |
|
VISUAL
dHash
|
ebd3c3c34b4363c3 |
|
VISUAL
wHash
|
017b7921f1e1f1e1 |
|
VISUAL
colorHash
|
39000c00000 |
|
VISUAL
cropResistant
|
ebd3c3c34b4363c3 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain