Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T101F00223A04148798CE6C1605F6AC24DA748D0C5FB0B1A013DCAA21C5EE9E5BC4B71C8 |
|
CONTENT
ssdeep
|
12:nwMy7FUN1vRR8LAy7ZWy8CfvRtS3llTRilfRetUe4m:n/C21JR8LACZFhfJol9RMe1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b1313171dfc76464 |
|
VISUAL
aHash
|
c3c3c3ffffffffff |
|
VISUAL
dHash
|
9696966806000000 |
|
VISUAL
wHash
|
03030303f0f0f0f0 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
9696966806000000,004007e8ece81782,a2a2412c32320810 |
• Threat: Phishing attempt targeting Social Security recipients
• Target: Social Security Administration users in the USA
• Method: Fake document prompting users to download an attachment
• Exfil: Potential malware or credential theft via downloaded file
• Indicators: Domain mismatch, hosted on Amazon S3, unusual instructions
• Risk: HIGH - Potential for malware infection or credential theft
Pages with identical visual appearance (based on perceptual hash)