Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DA51E060901AAC339113E1E46AE46B8B3297C306C787294867F4837C2EF3C5DDF66669 |
|
CONTENT
ssdeep
|
48:LUk1UJhhzkkz9d9zTOiyXhxnja26YXAPy9u5X/a3LM7ay6BLPHwur16:LdOZz9P+hxnebBy9u5vabMeBFPwE6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83f67e09890999fc |
|
VISUAL
aHash
|
3f3f3f3f3f3f3f3f |
|
VISUAL
dHash
|
d0ccccdad0d0d0d0 |
|
VISUAL
wHash
|
3f27373f3f000000 |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
a09c989080808080,f184acb6b6ac84f3,0e71710e20000000 |
• Amenaza: Phishing de credenciales
• Objetivo: Usuarios de Microsoft Outlook
• Método: Impersonación de la página de inicio de sesión de Outlook.
• Exfil: Desconocido, probablemente a una base de datos.
• Indicadores: Coincidencia de dominio, formulario presente, ofuscación.
• Riesgo: Alto
The attacker is using a fake login page that mimics the Microsoft Outlook login form to trick users into entering their credentials.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain