Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10D5165618000AC2BA19386C437E75BDB7A9147D0C7074724C7FD231DAECBED5DD226A8 |
|
CONTENT
ssdeep
|
48:T8KoN1bywMFi+BIijJ2BUlRhZM9mNPfdOdfHssdCBJpgqu:T8Kk1uwMFi9itlGcNPfdOdfHssdKpgqu |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
dc9f2624951b9959 |
|
VISUAL
aHash
|
0190f8f8fff80040 |
|
VISUAL
dHash
|
77233030b0b11195 |
|
VISUAL
wHash
|
09c0f8f8fff800f8 |
|
VISUAL
colorHash
|
02202010040 |
|
VISUAL
cropResistant
|
3327302330b0b121,92ccc8bf9ece9c38,9793939300960600,030307070f0e0707,eacb1b3ec1416061,00004a20b4dc4210,3122218111519593 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.
Found 6 other scans for this domain