Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12761433590459C7B6152D39873D6FF0461CAC2A6C70A6800A2F4D3CCABE7D20DDA65A5 |
|
CONTENT
ssdeep
|
48:TICYcV+cgNstRemx3YfkljfvHg68SBF0YTgl76214zeVb8JoaTokg:TClckkJfvHg68S0YTgQU4SNqomokg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
de9c732427382537 |
|
VISUAL
aHash
|
98bcbc3c3c7cf8a0 |
|
VISUAL
dHash
|
3038316868a02949 |
|
VISUAL
wHash
|
18bcbc3c3c7cf8a0 |
|
VISUAL
colorHash
|
0fc00018000 |
|
VISUAL
cropResistant
|
3cdcdc9909e9ddde,bc3438b6f4d03464,3038316868a02949,8b8b8383838387e7 |
• Amenaza: Suplantación
• Objetivo: Usuarios de Adobe PDF
• Método: Recopilación de credenciales
• Exfil: /site/submit
• Indicadores: Formularios, suplantación
• Riesgo: ALTO
The attacker aims to steal user credentials by mimicking a legitimate service and prompting users to enter their login details.
Pages with identical visual appearance (based on perceptual hash)
Found 7 other scans for this domain