Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1244262087EE12E4B5551C960D2716DCADFF1882BD7228848B85D71BD2F4CB8A4D2F9BC |
|
CONTENT
ssdeep
|
192:VQOzMP6pNQ8KY3XQ20pXxuWYpo88t8S3Ts:VQOIP6zQLCQQpozJo |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d393333199999999 |
|
VISUAL
aHash
|
4c243c3c00000000 |
|
VISUAL
dHash
|
194c686016000000 |
|
VISUAL
wHash
|
1c243c3cc0d4f0f0 |
|
VISUAL
colorHash
|
07018000600 |
|
VISUAL
cropResistant
|
194c686016000000 |
• Threat: Potential credential harvesting (generic login page).
• Target: Plala users.
• Method: Standard login form.
• Exfil: Unknown (no malicious behavior detected).
• Indicators: Login form present.
• Risk: LOW - Standard login page; no immediate threat detected.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain