Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13FB1E1B1C544A45E0BA3B9C4DA537E155186E019F61F0A1CB4EC6AAC1AC2FF4DCC1B63 |
|
CONTENT
ssdeep
|
96:dH3OuQRq8UpkMIf5mE+LbfWrP9jLcku4FKnC87D:xmqnpkMIf5SfWBEKkD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c6ce3971486ec699 |
|
VISUAL
aHash
|
00007e7e7e7e0000 |
|
VISUAL
dHash
|
2bf0ccecccccf007 |
|
VISUAL
wHash
|
007e7e7e7e7e0000 |
|
VISUAL
colorHash
|
02000000007 |
|
VISUAL
cropResistant
|
8c8c8c8c8e8e9696,2bf0ccecccccf007,2e274d189903060d,00100cb2b20c1000 |
• Threat: Credential harvesting phishing kit
• Target: Mexican passport applicants
• Method: Fake passport application form stealing personal data
• Exfil: Data sent via obfuscated JavaScript
• Indicators: Recent domain, obfuscation, mismatched government domain
• Risk: HIGH - Real-time credential theft
Pages with identical visual appearance (based on perceptual hash)