Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T144F2E8377111BC3706174AC0B9AA6B4F32A7D31ED91B20A006FC27E41BFAD95F927619 |
|
CONTENT
ssdeep
|
384:s1F+G+6jm9ZUGLpO9m9ZUGLu6SOBfREWYIraGlsQwHJQQN8tQ/Na/1TGv2zwYuYZ:1hSm+mJSOBfROqsYPhac/56CtKfrCyrA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
996666cc993966cc |
|
VISUAL
aHash
|
0000001818000800 |
|
VISUAL
dHash
|
040c0cb2b2081818 |
|
VISUAL
wHash
|
c0c0c4dcfceccc4d |
|
VISUAL
colorHash
|
07000c00040 |
|
VISUAL
cropResistant
|
a2d8b6aea8a280a2,040c0cb2b2081818 |
• Threat: Phishing for personal information using a fake job application form.
• Target: Job seekers interested in VirtualPA SERVICES.
• Method: Tricking users into signing in or submitting sensitive information on a Google Docs form with a vague and suspiciously attractive job offer.
• Exfil: Data likely sent to the attacker's email or another system for data harvesting; formResponse.
• Indicators: Unofficial Google Docs form, vague job description, unusually high pay for little work, request for donation, and requests for a login to continue with the application process.
• Risk: HIGH - Potential for credential theft and identity theft.
Found 10 other scans for this domain