Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16FB2B7A453446D3DB05383E8CB36337A32BA52D6E70A0218C5F843B8AA55DDEED375D8 |
|
CONTENT
ssdeep
|
384:usnQsR+scVhNSz6btp6KnP0iDhTk4Pyx5eFy:uVF1pf0iDC4oeFy |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
999a6f6922ba88ae |
|
VISUAL
aHash
|
9d0c1c1c08188080 |
|
VISUAL
dHash
|
7978313950d22810 |
|
VISUAL
wHash
|
fddc9e1e1c3d8088 |
|
VISUAL
colorHash
|
38038000000 |
|
VISUAL
cropResistant
|
7978313950d22810 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain