Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CE526032A051B53740C383F2AB302BAABBE0C2A7D693464595F8C35C5BD1D52DD2F62B |
|
CONTENT
ssdeep
|
192:CSZeRQxgRj5sMiDM6Mc+TfyKTpfT4I40STp4MnloFnxpq/+1qp31qPaWI:CJREaP6McWa6trZyhnixpaUk0XI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec6c9393c9693664 |
|
VISUAL
aHash
|
fff3c191f9ffe7ef |
|
VISUAL
dHash
|
5b262723330c861e |
|
VISUAL
wHash
|
fde38181f1ff0103 |
|
VISUAL
colorHash
|
07400080000 |
|
VISUAL
cropResistant
|
5b262723330c861e,1f2b4fdee2a23424 |
• Threat: Brand impersonation phishing
• Target: Users of TKStore
• Method: Landing page to trick users into clicking links
• Exfil: Unknown, likely redirect to credential harvesting form
• Indicators: Mismatched domain, suspicious URL
• Risk: HIGH - Brand impersonation may lead to credential theft.
Pages with identical visual appearance (based on perceptual hash)
Found 7 other scans for this domain