Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T196E2F9319184263E52074FD8F4E6B339304BD169D587A4909FFA01DA46E9CECE3792F6 |
|
CONTENT
ssdeep
|
384:IniRjd79HwJ7ATzzz2z9tLYHlwaWtMQhsnrEZkfKkOKkCr1lDWmwPxx4hukUiFPH:59QhWKmQxkpLt14bfpOF/4VW |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f8939313793b1313 |
|
VISUAL
aHash
|
08ffffc1c1c1c1c1 |
|
VISUAL
dHash
|
d9002b13132b3b3b |
|
VISUAL
wHash
|
08ffffc1c1c1c1c1 |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
82a00b13132b3b3b,282829dac9aa6aa9,272a2826263c3ca6,261999d9d9999946,08303008c8607969 |
• Threat: Document phishing using brand impersonation
• Target: Microsoft users, specifically those using Microsoft 365
• Method: A fake document hosted on a non-Microsoft domain attempts to trick users into clicking a button
• Exfil: Unknown, likely to a credential harvesting or malware installation site
• Indicators: Domain mismatch (pdfhost.io vs microsoft.com), Microsoft brand impersonation, generic call to action
• Risk: HIGH - Potential for credential theft, malware download, or further phishing attacks
Found 3 other scans for this domain