Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13F424D1490AED9B7A697E5E06FB4AB072784C30AC7570E04A3F5938D5EE6C49CD9D330 |
|
CONTENT
ssdeep
|
192:cZKi29e9u7NNUOOOuOHEWO0SpKelgLjw3Kedgajw3KeigDjw3Kergyjw3KelgEN8:coDNNUnz+hlmKelgLk3Kedgak3KeigDW |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e665969996999299 |
|
VISUAL
aHash
|
f3e3e3e3ffffffe7 |
|
VISUAL
dHash
|
c6c6cec691b90ded |
|
VISUAL
wHash
|
626141637c7cec67 |
|
VISUAL
colorHash
|
07c00000000 |
|
VISUAL
cropResistant
|
c6c6cec691b90ded,9a1416929a1e9393,47930325094d1830 |
Fake Facebook page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.