Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T113436CEABF121D77874696A1F436AD01B37A9D07898CCE84F19CD8842FFAE1D8127513 |
|
CONTENT
ssdeep
|
1536:qXF8awnep4mclCJ3WSykhtaALerxfya6j:qXqnefmjkhtaGutyao |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
989b7366cc5b321c |
|
VISUAL
aHash
|
ffff3e1818080000 |
|
VISUAL
dHash
|
f0f8f0b2b2f1dab2 |
|
VISUAL
wHash
|
ffffff1c18180800 |
|
VISUAL
colorHash
|
1bc00010000 |
|
VISUAL
cropResistant
|
e0e0f0f0f0f0f070,a8e0b8b8e4b083a2,f0f8f0b2b2f1dab2 |
• Threat: Microsoft login page phishing
• Target: Microsoft account users
• Method: Steals passwords via a fake login form.
• Exfil: Unknown data exfiltration point.
• Indicators: Domain mismatch, impersonates Microsoft.
• Risk: HIGH - Password theft risk
Pages with identical visual appearance (based on perceptual hash)
Found 9 other scans for this domain