Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17061533190459C7A6252D3A8B3D6FF0465CEC1A6C70A6800A3F4E3CDE7E7D10DAA659A |
|
CONTENT
ssdeep
|
48:nICYWVBcWzcYRlUxv8Xhj1fvHgoaZ6pB+OTgl162phmzeVb8JoaTokg:n7JLREAhRfvHgoaZ6KOTg2ywSNqomokg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
de9c73102738253f |
|
VISUAL
aHash
|
98bcbc3c3c7cf8a0 |
|
VISUAL
dHash
|
3038316868a02949 |
|
VISUAL
wHash
|
18bcbc3c3c7cf8a0 |
• Threat: Credential harvesting phishing targeting Adobe users.
• Target: Users trying to view or download PDF files.
• Method: Fake login form designed to steal usernames and passwords.
• Exfil: Unknown data exfiltration method.
• Indicators: Domain mismatch, fake "Adobe PDF" verification, and requests for login credentials.
• Risk: HIGH - Risk of stolen Adobe credentials, which may give attackers access to other accounts using the same username/password.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain