Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16041EDB1D285A43A22B2C6C5FB75BB35A1C6045CED422343C6F462BD1AC9DB4A40361E |
|
CONTENT
ssdeep
|
24:kq/JsAX/LDiNP1la5pJDkSg1t2lYA86MQiqkTA5uAOhxCVbMQCobMBC/bt:VpPLD4P1loOv1thQeTA5mGZBt |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
85ff911b3a906ee0 |
|
VISUAL
aHash
|
0cfff3000000ff00 |
|
VISUAL
dHash
|
384a8aaa23f69c8c |
|
VISUAL
wHash
|
ffffff000000ff00 |
|
VISUAL
colorHash
|
00000000c00 |
|
VISUAL
cropResistant
|
333332b299b9afaf,e369cce4e2d2eae0,7636686c8d893557,cbce8ace4e0a9a67,61eec4b0f0cfcbea,d8d69cd8d6925acc,d8d0b6b4aba69899,2d292929296b2a39,d3c5b5c9c5cdc306,acabaeabaaabab32,d293939393939336,384a8aaa23f69c8c |
• Threat: Brand impersonation phishing
• Target: bet365 users
• Method: Fake website mimicking bet365 branding
• Exfil: No form detected, likely redirects to malicious site
• Indicators: Domain mismatch, new domain, unrelated domain name
• Risk: HIGH - Potential for credential theft or malware distribution
Pages with identical visual appearance (based on perceptual hash)