Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17441EFF2D285A93622528AC6FE74B739F6D2014EF9411652C6F116FD03C9E79D042A47 |
|
CONTENT
ssdeep
|
24:kmspWxqnINXwbg35xuOala5Cx65z5PHY8uOtmnFWEK1hxCFbjv+OhoQQC+bjvyh0:CpWxqnm5pwvlFx6l607m7roT7aoH7ro6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cfb331c73131c698 |
|
VISUAL
aHash
|
ef3c3c003c7c3000 |
|
VISUAL
dHash
|
4969792af165600a |
|
VISUAL
wHash
|
ff3c3c307c7c3c00 |
• Threat: Brand impersonation phishing
• Target: Bet365 users
• Method: Redirects users to a fake website using a QR code or link
• Exfil: Likely to steal login credentials or payment information
• Indicators: Domain does not match the official Bet365 website, suspicious QR code, Chinese language
• Risk: HIGH - Potential for credential theft and financial loss
Pages with identical visual appearance (based on perceptual hash)