Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DA51E060901AAC339113E1E46AE46B8B3297C306C787294867F4837C2EF3C5DDF66669 |
|
CONTENT
ssdeep
|
48:LUk1UJhhzkkz9d9zTOiyXhxnja26YXAPy9u5X/a3LM7ay6BLPHwur16:LdOZz9P+hxnebBy9u5vabMeBFPwE6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83f67e09890999fc |
|
VISUAL
aHash
|
3f3f3f3f3f3f3f3f |
|
VISUAL
dHash
|
d0ccccdad0d0d0d0 |
|
VISUAL
wHash
|
3f27373f3f000000 |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
a09c989080808080,f184acb6b6ac84f3,0e71710e20000000 |
• Threat: Credential Phishing
• Target: Microsoft Outlook users
• Method: Impersonation of Outlook login page.
• Exfil: Unknown, likely to a database.
• Indicators: Domain mismatch, form present, obfuscation.
• Risk: High
The attacker is using a fake login page that mimics the Microsoft Outlook login form to trick users into entering their credentials.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain