Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T128A3953BE8444017252349F1F7A07F0D5ACAD18FCE878C86ABB887463BD6CE2D85596D |
|
CONTENT
ssdeep
|
1536:XT4PUwPfBMgxPjncPjncPjncPjnS4MF/ahRyrM9sP3/HlxElnf:j4PUwPf+gVahAgf |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83737e1c3cce6388 |
|
VISUAL
aHash
|
01006b731f1f3931 |
|
VISUAL
dHash
|
6ddacbc7f6ffe3e3 |
|
VISUAL
wHash
|
01006b7b1f1f3f71 |
|
VISUAL
colorHash
|
30000000180 |
|
VISUAL
cropResistant
|
a280c0260d4280a2,6ddacbc7f6ffe3e3 |
• Threat: Discord phishing landing page.
• Target: Discord users.
• Method: The attacker uses a fake Discord landing page to potentially trick users into downloading malware or giving up credentials.
• Exfil: No form is visible, but the page could lead to malware downloads or social engineering attacks for credential harvesting.
• Indicators: Domain mismatch (ai22.hgva.net vs discord.com).
• Risk: HIGH - Potential for malware distribution or credential theft via social engineering.
Pages with identical visual appearance (based on perceptual hash)