Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12672F9B0F4112CA78157DBF5D232D600272DD209D3439EE5F9B89BCC08F7C29E9665AA |
|
CONTENT
ssdeep
|
384:8k/nt7wFdpVlytT9hgTw4NqpLpO2qpLWnrxdB1y1j:FnWzwtopopN2pSxhy1j |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
989b7366cc5b321c |
|
VISUAL
aHash
|
ffff3e1818080000 |
|
VISUAL
dHash
|
f0f8f0b2b2f1dab2 |
|
VISUAL
wHash
|
ffffff1c18180800 |
|
VISUAL
colorHash
|
1bc00010000 |
|
VISUAL
cropResistant
|
e0e0f0f0f0f0f070,a8e0b8b8e4b083a2,f0f8f0b2b2f1dab2 |
• Threat: Credential harvesting phishing attack
• Target: Microsoft users
• Method: Fake Microsoft login page stealing passwords
• Exfil: Likely to a malicious server controlled by the attacker (details unavailable from image)
• Indicators: Domain does not match official Microsoft domain
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 9 other scans for this domain