Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E27178B06A8C0D3978C19045A514BFC764EFAA7161F101E07CB7683FEED61F0996C2BA |
|
CONTENT
ssdeep
|
96:U4lXnvSdV4IJ9x5QVFJe9J9x559wKbuF9gY:3vgVrJ9x5QVFw9J9x5nwKegY |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e6668c9999333399 |
|
VISUAL
aHash
|
e7e7e7e7ffffffff |
|
VISUAL
dHash
|
0c0c4d4c30080000 |
|
VISUAL
wHash
|
c3c3c3c30f0f0f0f |
• Threat: Credential harvesting phishing attack
• Target: Users of various email providers
• Method: Fake email quota upgrade form stealing email and password
• Exfil: Unknown, likely a custom API
• Indicators: Generic design, asks for login, suspicious domain
• Risk: HIGH - Real-time credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 6 other scans for this domain