Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10BA1121C12853B4F999952A2D3752E94D3E1941EC7324C58A85EE72F1C8814EEC7F9FC |
|
CONTENT
ssdeep
|
96:A3ydpoIL/N+lglAtyHL5ZiNrft5CLJWfsT3yDSxyHJHAPboRbDv72oDSZHlfd5D:j2bcRM3a0QD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b2969b3131dccc99 |
|
VISUAL
aHash
|
dfe7bdc3c3ffefff |
|
VISUAL
dHash
|
394c68049e600800 |
|
VISUAL
wHash
|
1f273f3f03130303 |
|
VISUAL
colorHash
|
07018000600 |
|
VISUAL
cropResistant
|
394c68049e600800 |
• Amenaza: Phishing
• Objetivo: Usuarios de plala
• Método: Recopilación de credenciales a través de una página de inicio de sesión falsa.
• Exfil: cgi-binsso/pf/agent_sso.php
• Indicadores: Desajuste de dominio, javascript ofuscado.
• Riesgo: Alto
The attacker creates a fake login page that mimics the plala login. Users are tricked into entering their credentials, which are then harvested.
Pages with identical visual appearance (based on perceptual hash)