Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T157D2743184D4497352E782D5B2E2DF1FF3C0C142EA078A5696FA8B5D03CAE4CCD6AA94 |
|
CONTENT
ssdeep
|
768:cUDMXo6OWz2qmHmeLt0lkFVCgvNga62JWP6z:pDkx2qmHmixECA2JWy |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d88927f74d7c1819 |
|
VISUAL
aHash
|
007c5cfcfcf4c000 |
|
VISUAL
dHash
|
c1d9b9b0a8282434 |
|
VISUAL
wHash
|
007c7cfcfcfce400 |
|
VISUAL
colorHash
|
0f007000000 |
|
VISUAL
cropResistant
|
b9f2e0e6a6d89d04,dacdcb9438b1e30f,1c110a0c8806670b,c1d9b9b0a8282434 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.
Found 1 other scan for this domain