Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E33422B4461C6DBB9AA3F6D067777FA22284C1B6DE0B0E0453E94F4E49D1FA6DC98310 |
|
CONTENT
ssdeep
|
1536:BLG+y7TFBaBVgDMJAVGqA7jpBlEVfDyJCVGqA7jpBlEVfDyJCVGqA7jpBlEVfDyf:ZOaBpJoQlE4JSQlE4JSQlE4JSQlE4J9 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
937f7b528084ad2d |
|
VISUAL
aHash
|
00003bffffffffff |
|
VISUAL
dHash
|
4949f6c8c0c0c0c0 |
|
VISUAL
wHash
|
0000003f3f3f7f7f |
|
VISUAL
colorHash
|
07000000006 |
|
VISUAL
cropResistant
|
4949f6c8c0c0c0c0,b2a4a6a2b2b280a0,c8a2b9aca4a19894,4cc6496949486d5f |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Found 1 other scan for this domain