Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13A22A6B52100252F570712943962EF2DA0CBE748EDABAC9576ED01C66FC3CB8CA952DC |
|
CONTENT
ssdeep
|
192:l+loxhytThxP8+ZpPmqYIDWAoM8KZpPmqYIDWAob:l+loxhytThFLm/GzoM7m/Gzob |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cc59b726736c988c |
|
VISUAL
aHash
|
801898402033b3ff |
|
VISUAL
dHash
|
133332d2c6666666 |
|
VISUAL
wHash
|
8098d8e06033f7ff |
|
VISUAL
colorHash
|
380080001c0 |
|
VISUAL
cropResistant
|
8888888c8c8c8c8c,133332d2c6666666 |
Fake Lingo site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.