Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11E51E060901AAC339113E1E86AE46B4B3297C705C787294867F4C37C2EF3C5DDF66669 |
|
CONTENT
ssdeep
|
48:+k1UJhhzkkz9d9zTOiyXhxnja26YXAPy9u5X/a3LM7ay6BLPHwur16:jOZz9P+hxnebBy9u5vabMeBFPwE6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83f67e09890999fc |
|
VISUAL
aHash
|
3f3f3f3f3f3f3f3f |
|
VISUAL
dHash
|
d0ccccdad0d0d0d0 |
|
VISUAL
wHash
|
3f27373f3f000000 |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
a09c989080808080,f184acb6b6ac84f3,0e71710e20000000 |
⢠Threat: Phishing
⢠Target: Outlook users
⢠Method: Impersonation of the login page.
⢠Exfil: Credentials
⢠Indicators: Mismatched domain, form for username/password.
⢠Risk: HIGH
The phishing site mimics the look of Outlook and attempts to steal usernames and passwords.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain