Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A31110218046A826839B92C895FBE30B2191C253DE17174227F873EC4DD2C68CD9A494 |
|
CONTENT
ssdeep
|
12:hFTMyLSLpAi3cxpubi2PvsBybb5HKmxa9253IbploJD9S9Ex2crOZDiUZrLY56m:hWOup1dvrbxaCDN9lxrgm6m |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8ff0930f6d5281b6 |
|
VISUAL
aHash
|
7f7f7fb838383c38 |
|
VISUAL
dHash
|
e0e6c16363e361e1 |
|
VISUAL
wHash
|
3f7f7c3818383838 |
|
VISUAL
colorHash
|
06000018000 |
|
VISUAL
cropResistant
|
e0e6c16363e361e1,4c4e74a4b3736155,6531b5b5b5b08d4c,5844642689f5e505,080911070a0a1604,2549195b13231f16 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain