Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F142334222082956C2B3489D95107684B387DB4FC961877096BC5E3F1FE2EA1A7A1F3F |
|
CONTENT
ssdeep
|
192:zQepY2ORHjb11jvCOsFbGBVtPCZw7yBNQ6VyNU4JXHwdBCWvojHcGhjwZB3+koQs:Y2ORldiy3XpOtRb8XhR |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d2a5528dad5aad52 |
|
VISUAL
aHash
|
e7e7e7fffffcfcfc |
|
VISUAL
dHash
|
0d0c4d0008000808 |
|
VISUAL
wHash
|
00e7e7ff03000000 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
0d0c4d0008000808,a280a28c8c8a80aa,454a25eacaa45045,c9c8b4b090a08e88 |
• Threat: Phishing
• Target: EE customers
• Method: Impersonation through a fake update page.
• Exfil: Unknown, likely leads to a credential harvesting site.
• Indicators: Free hosting, brand logo, call to action
• Risk: HIGH
The attacker aims to steal user credentials by mimicking a legitimate website and directing users to enter their login details on a fake form, likely after clicking the call to action.
Pages with identical visual appearance (based on perceptual hash)