Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C3012031608C28391BDFC0C60570639F7BD6C9168B2F269536FF43EC99E8A8CCC56181 |
|
CONTENT
ssdeep
|
12:nwM2XMx2Nw6gZhiSn/p3AkewzAhsCH/dF/ju7NQl:n/EoZhh3AHsCH/dF/ju7Nc |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cc99336666999966 |
|
VISUAL
aHash
|
0000181818181800 |
|
VISUAL
dHash
|
043032323232320c |
|
VISUAL
wHash
|
003c3c3c3c3c3c00 |
|
VISUAL
colorHash
|
30007000000 |
|
VISUAL
cropResistant
|
043032323232320c |
• Ameaça: Tentativa de phishing
• Alvo: Não especificado
• Método: Personificação via uma verificação de segurança
• Exfil: Desconhecido
• Indicadores: Domínio novo, redação genérica, animação de carregamento
• Risco: Alto
The site likely aims to trick the user into entering their credentials on a fake login form after this loading sequence.
After the loading animation completes, the site might redirect to a fake login page of a popular service.
Pages with identical visual appearance (based on perceptual hash)