Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11E51E060901AAC339113E1E86AE46B4B3297C705C787294867F4C37C2EF3C5DDF66669 |
|
CONTENT
ssdeep
|
48:+k1UJhhzkkz9d9zTOiyXhxnja26YXAPy9u5X/a3LM7ay6BLPHwur16:jOZz9P+hxnebBy9u5vabMeBFPwE6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83f67e09890999fc |
|
VISUAL
aHash
|
3f3f3f3f3f3f3f3f |
|
VISUAL
dHash
|
d0ccccdad0d0d0d0 |
|
VISUAL
wHash
|
3f27373f3f000000 |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
a09c989080808080,f184acb6b6ac84f3,0e71710e20000000 |
• Threat: Phishing
• Target: Microsoft Outlook users
• Method: Credential harvesting
• Exfil: Unknown. Obfuscation suggests exfiltration may be present
• Indicators: Domain mismatch, use of obfuscation.
• Risk: HIGH
The site is designed to steal the victim's login credentials for Microsoft Outlook. It imitates the official login page, tricking users into entering their email and password.
The use of JavaScript obfuscation makes analysis more difficult. Malicious code could be present to further compromise the victim's data.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain