Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T194C266E29D84E0735192C1E0EA7E2F69F2A1D65ECBCB8B00DBE953449FDBC55DC250A0 |
|
CONTENT
ssdeep
|
384:nqs/6mPS/oW9SIw/FolvL7taWjr4NX8cTMPSFb8oJ1+iurXAnnZRHCNLQNLbEw:36aOOIw/Fw7739P0dX |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ca0d4a0f5b5b2dd2 |
|
VISUAL
aHash
|
00c1fafcfff3fcf0 |
|
VISUAL
dHash
|
c117a2d085578585 |
|
VISUAL
wHash
|
00f1f0fcff80f4d0 |
|
VISUAL
colorHash
|
07600000080 |
|
VISUAL
cropResistant
|
828282e2e2828082,1382d0b907558595,f1c007939717a2a2,7161e3e32068b53c,1b0d0d0d0d2d393d,0f0c4c4c0406c667,c9f199a83c8fc38b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain