Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E4410E7140047C3F5583A3D8DB71A78AF3DAC202CE67160262FDE30D0ED6D46CCA9A98 |
|
CONTENT
ssdeep
|
48:tGkvGcC97INc9JcBfosio88anYBqOBs4adBadxf2:tBGb9sNgJcfG7d++dwdxf2 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3e2cc1d76e21919 |
|
VISUAL
aHash
|
ffffffe70000ffff |
|
VISUAL
dHash
|
94294c0d08180008 |
|
VISUAL
wHash
|
70e6e4e40000ffff |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
8c102848304d4d30,0000000000000000,00100c32b2b20c20,08831a1a1a180800 |
• Threat: Phishing
• Target: DKB customers
• Method: Credential Harvesting
• Exfil: ./Asstes/php/config/func.php
• Indicators: Mismatched domain, form, obfuscation
• Risk: Critical
The attacker aims to steal the user's login credentials by displaying a fake login page that mimics the appearance of the DKB banking website. The user's entered data will then be sent to a server controlled by the attacker.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain