Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DF21E021583E897779C28AFC71D9B21D22DAC606CF530D1256FA83ED1AD2E9FCC65284 |
|
CONTENT
ssdeep
|
24:iCOgecuDfjYHMC117rV/vt/iU8PDNbNxPFYT0zmaHWhLS:McCbYp17dBiU0NbjPFYT0zmaQG |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
99cc663399cc6633 |
|
VISUAL
aHash
|
0000181818000000 |
|
VISUAL
dHash
|
200c32b2b2281400 |
|
VISUAL
wHash
|
0f0f1b1b1b1b0303 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
200c32b2b2281400 |
• Amenaza: Kit de phishing para robo de credenciales
• Objetivo: Usuarios de Kakao en Corea
• Método: Formulario falso que roba email y contraseña
• Exfil: Datos enviados a servidor desconocido
• Indicadores: Dominio no coincide, JavaScript ofuscado
• Riesgo: ALTO - Robo inmediato de credenciales
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain