Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A061543190459C7A6252D398B3D6FF0465CEC1A6C70A6800A3F4E3CDE7E7D10DEA6599 |
|
CONTENT
ssdeep
|
48:TICYWVBcWzcYRlUxv8Xhj1fvHgoaZ6pB+OTgl162phmzeVb8JoaTokg:T7JLREAhRfvHgoaZ6KOTg2ywSNqomokg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
de9c73102738253f |
|
VISUAL
aHash
|
98bcbc3c3c7cf8a0 |
|
VISUAL
dHash
|
3038316868a02949 |
|
VISUAL
wHash
|
18bcbc3c3c7cf8a0 |
|
VISUAL
colorHash
|
0fc00018000 |
|
VISUAL
cropResistant
|
3cdcdc9909e9ddde,bc3438b6f4d43464,3038316868a02949,8b8b8383838387e7 |
• Threat: Credential Phishing
• Target: Adobe PDF users
• Method: Impersonation via login form
• Exfil: /site/submit
• Indicators: Domain mismatch, login form
• Risk: Alto
The attacker sets up a fake login page that mimics the appearance of a legitimate service (Adobe PDF). Users are tricked into entering their username and password, which the attacker then collects.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain