Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10BD1EDB29408AD3B5363C3D9A6B2A34FF782D185D987058AE1F6D30E1FD3DA4CD06252 |
|
CONTENT
ssdeep
|
96:amY7H+ZnoGyPfmGjZz2Kh8h4TrwsmzClPjmUbTuGW/5NrGozuvcx/gZ:amYb+CFuOdPQiwpbr9/S |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fe7e1e81a1616d84 |
|
VISUAL
aHash
|
809c8080ffffffff |
|
VISUAL
dHash
|
0a38200338202024 |
|
VISUAL
wHash
|
80808080fffff3f3 |
• Threat: Brand impersonation phishing
• Target: Instagram users
• Method: Fake Instagram page to potentially redirect to malicious content or attempt credential theft
• Exfil: Unknown, likely redirection or data harvesting
• Indicators: Blogspot domain, incorrect URL, Instagram logo
• Risk: HIGH - Potential for credential theft or malware infection
Pages with identical visual appearance (based on perceptual hash)