Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E27178B06A8C0D3978C19045A514BFC764EFAA7161F101E07CB7683FEED61F0996C2BA |
|
CONTENT
ssdeep
|
96:U4lXnvSdV4IJ9x5QVFJe9J9x559wKbuF9gY:3vgVrJ9x5QVFw9J9x5nwKegY |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e6668c9999333399 |
|
VISUAL
aHash
|
e7e7e7e7ffffffff |
|
VISUAL
dHash
|
0c0c4d4c30080000 |
|
VISUAL
wHash
|
c0c0c0c0f0f0f0f0 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
0c0c4d4c30080000 |
• Threat: Credential harvesting phishing attack
• Target: Users of various email providers
• Method: Fake login form to steal email and password
• Exfil: Likely to a malicious server
• Indicators: Unrelated domain name, generic login form, email quota upgrade request
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 6 other scans for this domain