Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T134B419A8F2B0640D43A7017A617F354473B6691EA56944287679CCEAB8E494C323FFFC |
|
CONTENT
ssdeep
|
6144:tRPyUDP0SutXn0HphBXi+ZcWW3Djwe6N8wXVB3q7lBIq5LtBo+8clJ:qOclSV0Bj5NlX |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f7227588dd88d998 |
|
VISUAL
aHash
|
e7e7e7e7fffffffe |
|
VISUAL
dHash
|
4d4d4d4d000c0000 |
|
VISUAL
wHash
|
00e7242481ff3d3c |
|
VISUAL
colorHash
|
0700000008b |
|
VISUAL
cropResistant
|
4d4d4d4d000c0000,40cccccc8ccd06e8 |
• Amenaza: Phishing
• Objetivo: Clientes de BT/EE
• Método: Suplantación de identidad a través de una página de actualización falsa.
• Exfil: Desconocido, pero lo más probable es la recopilación de datos.
• Indicadores: Alojamiento gratuito, logotipo de la marca, llamada a la acción.
• Riesgo: Alto
The attacker likely aims to steal user credentials by creating a fake login page that mimics the appearance of the BT/EE website.
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain