Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F4F122B150C2B637498391E1D2B16B5FB3A18759CA630F41D2FD834D5FC6EA6CE23190 |
|
CONTENT
ssdeep
|
96:TPuyWG1rpQ1ItARRfFUpQ1nPaBjeheXK7KLK1khKyK7K0K1K0KsKrzKSx9z3L+:V1rphIUpRryQoCZyXq1DmZx9zK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9c49bac3bee18cc1 |
|
VISUAL
aHash
|
ff0000000000ffff |
|
VISUAL
dHash
|
6b7032146960082d |
|
VISUAL
wHash
|
ff00000000ffffff |
|
VISUAL
colorHash
|
02000038000 |
|
VISUAL
cropResistant
|
000b232b2b830002,75529aab57696969,8c8c883163888c8c,8280c080900c8082,30084c082c2c2c2c,6170b23204486962 |
Fake Gusto page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.