Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19D12EB9018556C3E435253CEEA92D72592CBC372CB10790992F4AB6E3FE6F90CFD6219 |
|
CONTENT
ssdeep
|
96:0xejij9hryuNFr7vzc3DTFo+rb+AAI78n8gY2n8kAu2MSxt6kS0qDNbfITZR+Wdx:nizt83DTLbQ8i8XMYt6kS0GN0j+2 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f6d9a96689592619 |
|
VISUAL
aHash
|
fcfcccfcf4e0c0d0 |
|
VISUAL
dHash
|
00101008680c1014 |
|
VISUAL
wHash
|
f8f8d8ecfce480c0 |
|
VISUAL
colorHash
|
07000000180 |
|
VISUAL
cropResistant
|
00101008680c1014 |
• Amenaza: Phishing
• Objetivo: Usuarios de e-Devlet Kapısı
• Método: Impersonación de la página de inicio de sesión
• Exfil: log-isleniyor.php (probablemente)
• Indicadores: Dominio nuevo, envío de formulario, suplantación de marca
• Riesgo: Alto
The attacker attempts to steal user credentials by mimicking the e-Devlet Kapısı login page and capturing the username and password.
Pages with identical visual appearance (based on perceptual hash)