Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BE41C071100C7C3F4987EBF88BB1A78AA3D9D605C86B160661F8E34C5EC6E52DD806DC |
|
CONTENT
ssdeep
|
48:xz4DKxXJcUfos/HSLtTeA6Bs4adBadxf2:xXJlfLq6+dwdxf2 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3e2cc1d76e21919 |
|
VISUAL
aHash
|
ffffffe70000ffff |
|
VISUAL
dHash
|
94294c0d08180008 |
|
VISUAL
wHash
|
60e6e4e40000ffff |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
8c102848304d4d30,0000000000000000,00100c32b2b20c20,08831a1a1a180800 |
• Amenaza: Phishing
• Objetivo: Clientes de DKB
• Método: Recopilación de credenciales
• Exfil: hot/hakona.php
• Indicadores: Coincidencia de dominio, envío de formulario, suplantación de marca
• Riesgo: ALTO
The attacker attempts to steal user credentials by presenting a fake login form that looks like the legitimate DKB login page.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain