Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14F1112A8000488BB179286F41693F72BB582CD42CF8735044BE093FF6AD3E50CE591D5 |
|
CONTENT
ssdeep
|
12:nYpH0fE9Tp+amGy7FUOYkDBzPaskzzuj6uoJD9kDVgOtWycWlVX9MtdWJ+pES:nkl9TQVGChPaJ/N9uuOHNlVX9MTaS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b399cc6699992666 |
|
VISUAL
aHash
|
ffffe7ffe7e7e7ff |
|
VISUAL
dHash
|
000008324d4d0c10 |
|
VISUAL
wHash
|
f0f0e0f827270f0f |
|
VISUAL
colorHash
|
07000003180 |
|
VISUAL
cropResistant
|
000008324d4d0c10 |
• Threat: Credential harvesting phishing
• Target: Facebook users
• Method: Fake Facebook login page on a free hosting platform designed to steal login credentials.
• Exfil: Unknown, likely sent to a server controlled by the attacker.
• Indicators: Free hosting (GitHub Pages), Facebook logo on unofficial domain, login form.
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain