Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T128A5F99CB6A271519363F5B9002F000AA23F64A6F849487CB2DDDDD26EF594D0277FB8 |
|
CONTENT
ssdeep
|
12288:Ymxgapldndc+CLpdhDNeARkapjTdPUxkDcmDW2L0djjEG1mDl8cumZfT4fyKNY/o:JgapmDW24CG1G8PE4fvG59MulWTs3/u |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
faa5d26a8dda811a |
|
VISUAL
aHash
|
efc3efbd81c19cfc |
|
VISUAL
dHash
|
de861c612f213131 |
|
VISUAL
wHash
|
efc3ef0081c09cfc |
|
VISUAL
colorHash
|
07000000180 |
|
VISUAL
cropResistant
|
de861c612f213131,71f8dcfc71a28ab8,043279793254d936 |
This is a phishing attempt impersonating AT&T using an unofficial Google Docs domain. Users are asked to update their account by clicking on a suspicious link.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain