Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12152B8E112246BAD84D795DEAF72D694638F80B6FAA2C5C45AFECB5858C3C80F717810 |
|
CONTENT
ssdeep
|
384:yw/O+rMimrrRMAciBMABrczvtVqpM6KK3:fkrriPdI+vtV0X3 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cc9933666699cc36 |
|
VISUAL
aHash
|
0018181818000000 |
|
VISUAL
dHash
|
14b2b2b232343008 |
|
VISUAL
wHash
|
383c3c3c18181800 |
|
VISUAL
colorHash
|
07008000c00 |
|
VISUAL
cropResistant
|
e060e8608c9c3111,14b2b2b232343008 |
• Threat: Webmail credential phishing
• Target: Hover customers
• Method: Fake webmail login page to steal email and password
• Exfil: Unknown data exfiltration point
• Indicators: Domain mismatch, login form, Hover brand impersonation
• Risk: HIGH - Potential credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain