Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A232134622083965C2F3489994507684B387DF4FC9618B7086BC5E3F1FD2AA2A795F3F |
|
CONTENT
ssdeep
|
192:cQO0YOryHjbI1jetPCZw7yBNQ6VyNU4JQMdBCWvoacsLjwpcBlb5h1oQ46X8Yz+h:2OryZdiy3Bg6BR+FhoQ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d2a5528dad5aad52 |
|
VISUAL
aHash
|
e7e7e7fffffcfcfc |
|
VISUAL
dHash
|
4d4d4d000c000808 |
|
VISUAL
wHash
|
e0e0e680f3f0f0f0 |
|
VISUAL
colorHash
|
070000004c0 |
|
VISUAL
cropResistant
|
4d4d4d000c000808,455105f4b4a44145,c9c8b0b09088aa8e |
• Amenaza: Phishing
• Objetivo: Clientes de BT/EE
• Método: Suplantación de identidad a través de alojamiento gratuito.
• Exfil: Desconocido (probablemente credenciales)
• Indicadores: Alojamiento gratuito, logotipos de marca, llamado a la acción para ver la factura
• Riesgo: ALTO
The attacker is likely attempting to steal login credentials. A user clicking on the call to action may be redirected to a fake login page.
Pages with identical visual appearance (based on perceptual hash)
Found 7 other scans for this domain