Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17061533190459C7A6252D3A8B3D6FF0465CEC1A6C70A6800A3F4E3CDE7E7D10DAA659A |
|
CONTENT
ssdeep
|
48:nICYWVBcWzcYRlUxv8Xhj1fvHgoaZ6pB+OTgl162phmzeVb8JoaTokg:n7JLREAhRfvHgoaZ6KOTg2ywSNqomokg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
de9c73102738253f |
|
VISUAL
aHash
|
98bcbc3c3c7cf8a0 |
|
VISUAL
dHash
|
3038316868a02949 |
|
VISUAL
wHash
|
18bcbc3c3c7cf8a0 |
|
VISUAL
colorHash
|
0fc00018000 |
|
VISUAL
cropResistant
|
3cdcdc9909e9ddde,bc3438b6f4d43464,3038316868a02949,8b8b8383838387e7 |
• Amenaza: Suplantación de credenciales
• Objetivo: Usuarios de Adobe PDF
• Método: Suplantación y envío de formulario
• Exfil: /site/submit
• Indicadores: Dominio incorrecto, formulario de inicio de sesión
• Riesgo: ALTO
The attacker creates a fake login page that mimics a legitimate service (Adobe PDF) to trick users into entering their credentials.
Pages with identical visual appearance (based on perceptual hash)