Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B9D10EB05041BA3300E78399EF359BDA73D88254DB474B0923F5D39C9AD6E5FDE21825 |
|
CONTENT
ssdeep
|
96:TXSJIh7JDDpdQqRwFRLmZ/YV8DYdPCFbBUqs/AdhryZ1wDW/2cyK/:r2IRannkYqs/Adhry3yWTyK/ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8e19194fd1d14f4e |
|
VISUAL
aHash
|
000301ffb430ffff |
|
VISUAL
dHash
|
dadbddbd656565a5 |
|
VISUAL
wHash
|
000101ffb0b0ffff |
|
VISUAL
colorHash
|
07207000000 |
|
VISUAL
cropResistant
|
8282c2d2d2c28282,dbdf9be465656565,e1db1adbdbefbd9e,d9e6766663697926,4c9736666d595932,adcdd9b3b3b7bfbe,616c6e5e1e5e7e7c,0d060282020a9a9a |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain