Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BDB3DB30C6F65D7BA47C7289EAC8E74151A7C3C3F3866BF6619491EE8A40D05CC43ADA |
|
CONTENT
ssdeep
|
1536:t7ONB8lG0XD48lG0XihUc689wGXsMvkYw:1E8lG0XD48lG0XihUc689wGXsMM |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bb39ccc6fe11c1c0 |
|
VISUAL
aHash
|
0f0f0f0fffffffbf |
|
VISUAL
dHash
|
3b3bdb3f28412820 |
|
VISUAL
wHash
|
00090901bfbfbf9f |
|
VISUAL
colorHash
|
07e00008000 |
|
VISUAL
cropResistant
|
3b3bdb3f28412820,9e9e9a9999321327,1f93b793232f6b0f,3736333733492b07,49cdcdcdcdcd4943 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain