Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F142334222082956C2B3489D95107684B387DB4FC961877096BC5E3F1FE2EA1A7A1F3F |
|
CONTENT
ssdeep
|
192:zQepY2ORHjb11jvCOsFbGBVtPCZw7yBNQ6VyNU4JXHwdBCWvojHcGhjwZB3+koQs:Y2ORldiy3XpOtRb8XhR |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d2a5528dad5aad52 |
|
VISUAL
aHash
|
e7e7e7fffffcfcfc |
|
VISUAL
dHash
|
0d0c4d0008000808 |
|
VISUAL
wHash
|
00e7e7ff03000000 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
0d0c4d0008000808,a280a28c8c8a80aa,454a25eacaa45045,c9c8b4b090a08e88 |
• Ameaça: Phishing
• Alvo: Clientes da EE
• Método: Imitação por meio de uma página de atualização falsa.
• Exfil: Desconhecido, provavelmente leva a um site de coleta de credenciais.
• Indicadores: Hospedagem gratuita, logotipo da marca, botão de chamada para ação
• Risco: ALTO
The attacker aims to steal user credentials by mimicking a legitimate website and directing users to enter their login details on a fake form, likely after clicking the call to action.
Pages with identical visual appearance (based on perceptual hash)