Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T146218B68E048893747A3D1D9A6A1A35F3AA0878CD7130B056FF8039927DFEA8CD021D9 |
|
CONTENT
ssdeep
|
24:n/nTxVx/cIgDETsCVlWJnPRNPALc756Fl+Nit8zZrAd:ntf/cIgwYCvA3PW8CMiN |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9b4be68cd933c88c |
|
VISUAL
aHash
|
180018081d1f1fbf |
|
VISUAL
dHash
|
7161717b33717d79 |
|
VISUAL
wHash
|
391818081f1f1fff |
|
VISUAL
colorHash
|
07001088040 |
|
VISUAL
cropResistant
|
7161717b33717d79 |
• Threat: Microsoft login page phishing
• Target: Users accessing Microsoft services.
• Method: Displays a fake "Taking you to your organization's sign-in page" prompt to potentially capture credentials on a subsequent page.
• Exfil: Likely redirects to a credential harvesting form hosted elsewhere.
• Indicators: Unofficial domain (pub-f8ae05628d044493abc7f11a802215fc.r2.dev), r2.dev hosting platform.
• Risk: HIGH - Potential credential theft.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain