Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1770263736000C92A5EE7D58DF7C0E58D519AD30AFB318886B1E0A1AF7BC4DF5596236C |
|
CONTENT
ssdeep
|
96:sb3J0CzaR1sYSlnMRzRlnZZzz/s3FT2BQLjxNlnozafMmORR1E8VConuEBcEXc8l:sb3JQdSCFLNI1iB4Ny2fMmUU8VCoP |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f0f00f0f0f170f17 |
|
VISUAL
aHash
|
02c2c6c6460c0c09 |
|
VISUAL
dHash
|
be9e949cbc78f879 |
|
VISUAL
wHash
|
02c6cece5e1e0e1f |
|
VISUAL
colorHash
|
00000000038 |
|
VISUAL
cropResistant
|
fffbf6ecd830c080,e0c0b0f0803131e0,9d9d9f9f9a7efc6c,f8d8f0b060c08003 |
โข Threat: Phishing attack
โข Target: BT users
โข Method: Impersonation through a fake login page.
โข Exfil: Unknown (likely via Javascript)
โข Indicators: Malicious domain, login form, BT branding.
โข Risk: High
The site uses a fake login form to collect user credentials (email/username and password). The collected credentials can then be used for identity theft or further attacks.
The use of javascript obfuscation hides the malicious functionality from basic analysis. Likely to submit the form data to the attackers.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain