Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1055173314849E88F857380C1F653791DE243851A8B534F41B7A9C6E5F9D6D36D93138E |
|
CONTENT
ssdeep
|
48:AU6CCSEM/8pwWTNmTNMQk52SVT1kNNyybxafd+WhmkUq8GTxBaLN0:sSfk53VTuNrad/m2sLN0 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fb79c484637a3906 |
|
VISUAL
aHash
|
c2ff818183ffffe7 |
|
VISUAL
dHash
|
16d61b3b671b0c4d |
|
VISUAL
wHash
|
c0da818101ffe7e7 |
|
VISUAL
colorHash
|
07000400049 |
|
VISUAL
cropResistant
|
16d61b3b671b0c4d,2d2d929292d27065,66aaca4a2a2aaa66,0f3371696971310f,0f71616969696969,0f3371696971310f,33f5c4653594b567,6969713313061d3a,0008101010100800 |
• Threat: Phishing attack
• Target: YONO SBI customers
• Method: Impersonation and URL redirection
• Exfil: Form submissions to an unknown location
• Indicators: URL shortener, reward points offer, brand impersonation
• Risk: HIGH
The attacker creates a fake login page that closely resembles the genuine YONO SBI website. The user is tricked into entering their login credentials.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain