Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A6910F1822853B4F999952A2D3752E94D3E2941EC7724C58B81EE72F1C8814EEC7F9FC |
|
CONTENT
ssdeep
|
96:A3ydpoIL/N+lglAtyHL5ZiNrft5CLJWfsT3yDSxyHJHAPboRbDv72oDSZQ:j2bcRM3a0v |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b2969b3131dccc99 |
|
VISUAL
aHash
|
dfe7bdc3c3ffefff |
|
VISUAL
dHash
|
394c68049e600800 |
|
VISUAL
wHash
|
1f273f3f03130303 |
|
VISUAL
colorHash
|
07018000600 |
|
VISUAL
cropResistant
|
394c68049e600800 |
• Amenaza: Phishing
• Objetivo: Usuarios de plala
• Método: Recopilación de credenciales
• Exfil: cgi-binsso/pf/agent_sso.php
• Indicadores: Discordancia de dominio, formulario de inicio de sesión, ofuscación
• Riesgo: ALTO
The attacker aims to steal user credentials by creating a fake login page that closely resembles the legitimate service.
Pages with identical visual appearance (based on perceptual hash)