Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17563BF35B1501E33016793C8FBA5576F2371C748C95A0F5812ACC37A3ADFD69E8162AE |
|
CONTENT
ssdeep
|
1536:L/bd6tAOuxz6XKEVclH9VTX0+mmMGG8LJhMAj0L7UP:P0qPeaEVctPX0JafP |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cbd33c33762c5530 |
|
VISUAL
aHash
|
283c3c3c3c3c0101 |
|
VISUAL
dHash
|
c9c9e9e1c9c9b3eb |
|
VISUAL
wHash
|
3c7c7c7c7c7c0301 |
|
VISUAL
colorHash
|
07000000183 |
|
VISUAL
cropResistant
|
939bcc8e83139b9a,a88e86d6aa228e9e,c9c9e9e1c9c9b3eb,a912d2da192462a2,79f927581a0a1a0a |
• Amenaza: Estafa de phishing
• Objetivo: usuarios de Microsoft
• Método: Alerta de seguridad falsa con número de teléfono
• Exfil: Número de teléfono
• Indicadores: Dominio no relacionado, urgencia, llamada a la acción
• Riesgo: Alto
The attacker creates a fake Microsoft security alert to trick users. The main goal is to get the user to call a fake support number and either pay or divulge sensitive information.
The attacker may try to have the user download and execute a file or give remote access, which installs malware
Pages with identical visual appearance (based on perceptual hash)