Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A091413651286AB38596D6C5ABAD834F73C18198FB53130457F8C38CDBDEC8AE832691 |
|
CONTENT
ssdeep
|
96:TZb9Dl8KeS6hd1eV/dNLG9oOSqSaASmLBqe:tb9J8KX8d8g9Mna5mLBd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f364663199ce898b |
|
VISUAL
aHash
|
c3c3fffffffff7ff |
|
VISUAL
dHash
|
8e8e080818386828 |
|
VISUAL
wHash
|
c2c0e4e4fcfce4e0 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
8e8e080818386828,4d33333351c87131 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.
| ID | Portuguese | English | Trigger |
|---|---|---|---|
Found 10 other scans for this domain