Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17C1234D2C404DE3A031685D9F7F52B5FB996C359CB06098493FC82AB9BDBC60CA12799 |
|
CONTENT
ssdeep
|
192:kQHkahHW1UadyjlGjWwy04rIM1OIMGnpBjQR:k6Q5QjlGi10M17MGnTM |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b626631c994d3667 |
|
VISUAL
aHash
|
00e7e7ffdfdfe3e7 |
|
VISUAL
dHash
|
f00c4d2034380a0e |
|
VISUAL
wHash
|
00e7e0f88f8fc3c3 |
|
VISUAL
colorHash
|
073c0000000 |
|
VISUAL
cropResistant
|
f00c4d2034380a0e |
• Threat: Credential harvesting phishing
• Target: Great Plains Federal Credit Union customers
• Method: Fake login form stealing user ID and password
• Exfil: Unknown, likely to a compromised server or email address.
• Indicators: Free hosting, mismatched domain, login form.
• Risk: HIGH - Immediate credential theft risk.
Pages with identical visual appearance (based on perceptual hash)