Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T134B419A8F2B0640D43A7017A617F354473B6691EA56944287679CCEAB8E494C323FFFC |
|
CONTENT
ssdeep
|
6144:tRPyUDP0SutXn0HphBXi+ZcWW3Djwe6N8wXVB3q7lBIq5LtBo+8clJ:qOclSV0Bj5NlX |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f7227588dd88d998 |
|
VISUAL
aHash
|
e7e7e7e7fffffffe |
|
VISUAL
dHash
|
4d4d4d4d000c0000 |
|
VISUAL
wHash
|
00e7242481ff3d3c |
|
VISUAL
colorHash
|
0700000008b |
|
VISUAL
cropResistant
|
4d4d4d4d000c0000,40cccccc8ccd06e8 |
• Ameaça: Phishing
• Alvo: Clientes BT/EE
• Método: Personificação através de uma página de atualização falsa.
• Exfil: Desconhecido, mas muito provavelmente colheita de dados.
• Indicadores: Hospedagem gratuita, logotipo da marca, chamada para ação.
• Risco: Alto
The attacker likely aims to steal user credentials by creating a fake login page that mimics the appearance of the BT/EE website.
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain