Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T192C11C7A6040F577428792F67331872B7792D281DB971B6019F983EC5FD2C19CD6B282 |
|
CONTENT
ssdeep
|
96:TSk4B9SLmjm3Gsc8/Gw8/GDI9mPueqxVRkDED3j2rPGNiZnPwY5S:+XSa4GsFG9Gs9mPue8VRkwD3j2rPSiZa |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e419360b5d707f31 |
|
VISUAL
aHash
|
0011c2f8786067f7 |
|
VISUAL
dHash
|
b4f59691d3c9cce6 |
|
VISUAL
wHash
|
0075c0f878f067f7 |
|
VISUAL
colorHash
|
07e00000002 |
|
VISUAL
cropResistant
|
97d59690d1eccce7,1631c63e69c7a6dd,ccbe57e7fff1cbcf,71cccea6a6c838d9,9da7f3d8e4d2d6d4,8d8d894929e1e9e9,6d65b3a343d32165,12129d918565796a,11116a4aa2b103a0,ccce4c5cc5711947 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.