Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12C219528C0059A670142D1C07FD7EA0679C443CBEB196F1098EDC3AD16E6F6ECC6E684 |
|
CONTENT
ssdeep
|
24:n/CMqc+1KuCL2vHVg345gKeU3+TcaV2tGS1/N/oJAT/tWyP9xAUMMj:nSKvL2ve36ReUOvV2tGOl/8AztxmI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
888936667799d966 |
|
VISUAL
aHash
|
0f071f1f071f0707 |
|
VISUAL
dHash
|
ffeff3b3cdf3ffff |
|
VISUAL
wHash
|
070f1f1f071f0f07 |
|
VISUAL
colorHash
|
07000019040 |
|
VISUAL
cropResistant
|
ffeff3b3cdf3ffff |
• Threat: Credential Phishing
• Target: Microsoft users
• Method: Impersonation via login form
• Exfil: Email address
• Indicators: Domain mismatch, young domain, form present
• Risk: HIGH
The attacker is attempting to steal user's credentials by presenting a fake login form that mimics the appearance of a Microsoft login page. The form will capture the email and possibly the password entered by the victim.
Pages with identical visual appearance (based on perceptual hash)