Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19D12EB9018556C3E435253CEEA92D72592CBC372CB10790992F4AB6E3FE6F90CFD6219 |
|
CONTENT
ssdeep
|
96:0xejij9hryuNFr7vzc3DTFo+rb+AAI78n8gY2n8kAu2MSxt6kS0qDNbfITZR+Wdx:nizt83DTLbQ8i8XMYt6kS0GN0j+2 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f6d9a96689592619 |
|
VISUAL
aHash
|
fcfcccfcf4e0c0d0 |
|
VISUAL
dHash
|
00101008680c1014 |
|
VISUAL
wHash
|
f8f8d8ecfce480c0 |
|
VISUAL
colorHash
|
07000000180 |
|
VISUAL
cropResistant
|
00101008680c1014 |
• Ameaça: Phishing
• Alvo: Usuários do e-Devlet Kapısı
• Método: Imitação da página de login
• Exfil: log-isleniyor.php (provavelmente)
• Indicadores: Domínio novo, envio de formulário, personificação da marca
• Risco: Alto
The attacker attempts to steal user credentials by mimicking the e-Devlet Kapısı login page and capturing the username and password.
Pages with identical visual appearance (based on perceptual hash)