Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18C027606B548360C629A83A8FE33C7D7B31543D5E2080BF9A7B8427F785C6E4887A5DD |
|
CONTENT
ssdeep
|
192:jYTz2mxxs7lO79qV6TM2da7lmnI2mJMjwN1q6nrp9D:jYTz2mvUlO79qVNXlnrpp |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b0343166cedbc674 |
|
VISUAL
aHash
|
c3c3c3ffc7ffffff |
|
VISUAL
dHash
|
9696961616161e1e |
|
VISUAL
wHash
|
c3c3c3c3c3c3c3c3 |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
9696961616161e1e,6b6295b9b5b5b456,5b6bae3a2c2ce4ec,7fdcdcf8fcfedcff |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain