Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E9F10C32944CEC3B23231FD1B592B705E2D6C76ECA421610D6B9439E0FEBED2E44665B |
|
CONTENT
ssdeep
|
192:IHBJ6kYMzvUY6C3CYE2txdUxe8I+jKkrk+jg1rTj3rrqdv:KBJ6kp8pe7Cxe8I+jKkrVjg1rTj3rrqJ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cc666699333133b3 |
|
VISUAL
aHash
|
0010001818181800 |
|
VISUAL
dHash
|
70624cb2b2b2b24c |
|
VISUAL
wHash
|
00101f1f1f1f1f1f |
|
VISUAL
colorHash
|
070060000c0 |
|
VISUAL
cropResistant
|
98a6b2803336b8b8,70624cb2b2b2b24c |
• Threat: Plesk login page phishing
• Target: Plesk users
• Method: Attempts to steal Plesk usernames and passwords using a fake login form.
• Exfil: Likely exfiltrating data via JavaScript submission detected.
• Indicators: Domain mismatch (bero-webspace.de vs. plesk.com), JavaScript obfuscation, login form.
• Risk: HIGH - Could lead to account compromise and server access.
Pages with identical visual appearance (based on perceptual hash)