Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12CE3BD32C0423033A1AB56D5F860677926D3C22DDF0B08452BBCDB963FEBD967592A1D |
|
CONTENT
ssdeep
|
3072:egA76cUOugiUhoSWeBYVplVX/cn3x/hSCVuDdi5NvHao7LVq3u/19/JSA4LGZPI8:JA76cUOugiUhoSWeBYVplVX/cn3x/hSg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
911155555d7d7d28 |
|
VISUAL
aHash
|
003c3cbc3c3c3c3c |
|
VISUAL
dHash
|
b0d8f06060606060 |
|
VISUAL
wHash
|
003d7cfc3c3c3c3c |
|
VISUAL
colorHash
|
07200008180 |
|
VISUAL
cropResistant
|
b0d8f06060606060 |
• Threat: Impersonation/Phishing
• Target: JCB (potential target of the phishing attempt)
• Method: Domain spoofing, social engineering
• Exfil: Potentially the target domain will collect credentials.
• Indicators: Domain mismatch, suspicious content, text in Japanese language.
• Risk: High
The attackers are likely attempting to steal the user's credentials by leading them to a fake login page on the my.jcb.co.jp domain. They probably use a phishing technique.
The attacker uses the document title to trick the user.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain