Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10BE124131147586273A3E8F9F154353BBBC1E84ADBE32944E2F6A72D5AE7ED0CE25108 |
|
CONTENT
ssdeep
|
96:1JqO5C7/0MWuLa3Loe9Uzbpo4ltrvnOnGeRCpmMLvlS82TSDX1W8hssI9:OOI0MWuLHeu/79e54gAWaG |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c6ce393139939393 |
|
VISUAL
aHash
|
003c7e3c3c7e3c00 |
|
VISUAL
dHash
|
01e4d4d4d4d4d400 |
|
VISUAL
wHash
|
003c7e7e7e7e3c00 |
|
VISUAL
colorHash
|
3a000000000 |
|
VISUAL
cropResistant
|
aa004c0e0e4d4da2,e0888c8d8c0933a2,e8004c0c144e23b2,e0040d4996270f8c,e08c8d8d968c8eb2,01e4d4d4d4d4d400 |
• Amenaza: Suplantación de identidad
• Objetivo: Usuarios de Kraken
• Método: Redirigir a los usuarios a un sitio falso.
• Exfil: Potencialmente robar credenciales u otros datos.
• Indicadores: Coincidencia de dominio, uso de ofuscación.
• Riesgo: Alto
The site likely redirects users to a credential harvesting form.
Redirects users to a similar-looking site to steal login information.
Pages with identical visual appearance (based on perceptual hash)