Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13391341EE30C33A88F92031D79A553FFF62F64EDB2120AE43989D13821A569546F27D6 |
|
CONTENT
ssdeep
|
48:TRKCqqrP5/PIcZhccSK07PxPho7vq3DSQqZNjiY3VvI/ojRd/o/7Uph4rQ9HrLtz:TG2JwB7YbqWQqZNjiDgjU/Sh/tON1WMQ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cf3032cf383c4b3c |
|
VISUAL
aHash
|
007e183c383c383c |
|
VISUAL
dHash
|
c4c4f0f07061f0d0 |
|
VISUAL
wHash
|
207e187e3c3c387e |
|
VISUAL
colorHash
|
38000000e00 |
|
VISUAL
cropResistant
|
c4c4f0f07061f0d0 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain