Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D52372F19240A9AF856182DED3737FC8D7C2508AEB928C85E9A4D71D09C9C93DD172BC |
|
CONTENT
ssdeep
|
768:t7HZ6DfXJnFV2RBa45V7G1umloQxBgCRz:trZCfARhG1umlo+z |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cdb0b2b3c5ce4d0c |
|
VISUAL
aHash
|
ffff103010383030 |
|
VISUAL
dHash
|
0034726272626262 |
|
VISUAL
wHash
|
ffff303038383838 |
|
VISUAL
colorHash
|
031c0000000 |
|
VISUAL
cropResistant
|
0034726272626262 |
• Ameaça: Phishing
• Alvo: Usuários do Yahoo
• Método: Blog malicioso com formulário.
• Exfil: http://free.mailjol.net/allforms.php
• Indicadores: Domínio incomum, código ofuscado, envio de formulário JavaScript, ação de formulário suspeita.
• Risco: Alto
The website presents a login form designed to mimic Yahoo's login page. When a user enters their credentials, the form submits the information to a remote server controlled by the attackers.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain