Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12E4256A29400541B111641CA7657EF4B34C3E2458E7A0852A79543AB7FEF7F0ACFF39A |
|
CONTENT
ssdeep
|
192:QS8StSiS7oiwQcYIHgT8aEJ9omlu3sIbyxKDW6gtz3pj9nYk2a:QBWSiS7oiwQ8tDwJe3pj9YkB |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b0316547cf4f1b19 |
|
VISUAL
aHash
|
00c3c3ffffe7ffff |
|
VISUAL
dHash
|
961e9e16320f0c00 |
|
VISUAL
wHash
|
000303030303273f |
|
VISUAL
colorHash
|
06000000180 |
|
VISUAL
cropResistant
|
960e9e16320f0c00,171f5b4e46c2a484,0000343430303410,2c6c92d2d6964c7c |
โข Threat: Phishing
โข Target: DANA users
โข Method: Impersonation and form submission
โข Exfil: login.php (likely credentials)
โข Indicators: Mismatched domain, obfuscated code, loan offers
โข Risk: High
The site attempts to steal user credentials by mimicking the DANA brand and tricking users into entering their login information. The login form is sent to a PHP file, suggesting the exfiltration of credentials.
The site uses design and wording to trick users into believing it is a legitimate service.
Found 1 other scan for this domain