Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15241BD263089246B0B92679D6F21A36CA39391A38F590F0161E04B5FAFD3F17CE1109F |
|
CONTENT
ssdeep
|
48:nv1P84kwaFKuqiPNpUA4vxKW7rbOA4zitnbrA:n9iw+P |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b131cecc9e9364cc |
|
VISUAL
aHash
|
ffc7c7c7c3e3ffff |
|
VISUAL
dHash
|
189c9e989606280e |
|
VISUAL
wHash
|
0f030303c3c3cfc3 |
|
VISUAL
colorHash
|
07602008000 |
|
VISUAL
cropResistant
|
189c9e989606280e,6a9292183ce4a822 |
• Threat: Credential harvesting phishing kit
• Target: Instagram users
• Method: Fake login page to steal username/phone and password
• Exfil: Likely to a custom API or a Telegram bot
• Indicators: Free hosting, domain mismatch
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain