Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11B11CC50400398B7A19392E847EECE0426D2C752DB073A8286E83B5E1ED6E08CE3B554 |
|
CONTENT
ssdeep
|
12:/TMwrNvAxKXWRaQ5d8eE/KXSC8IHcr3txrlnKXSJ1feoJD9SIqts3r31MtWhrZNf:AkpGGjKj5Hk3t99KQ1fpN9yK3SGFNUKj |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9da732d24d1db232 |
|
VISUAL
aHash
|
ffff1f1a18180000 |
|
VISUAL
dHash
|
fc5f7fb2b2b13cb8 |
|
VISUAL
wHash
|
ffffff3a18180000 |
|
VISUAL
colorHash
|
03e08000000 |
|
VISUAL
cropResistant
|
7cfd5f7db2b2b2b1,7db2b2b3b13c30c8 |
• Threat: Credential harvesting phishing kit
• Target: BHD bank customers
• Method: Fake login form stealing username and password
• Exfil: Unknown data exfiltration method
• Indicators: New domain, suspicious TLD (.lat), login form detected
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)