Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18823EEFB1040AD2E5316E1CE683A7709E193530ECEA65CD5FBA84FF35686B73941182B |
|
CONTENT
ssdeep
|
384:6scndyIKd5u1IUj1fpI7InwszPK1mBpCFIeWVVwsk3fMa86PznRTH:6Jn/NznhYFrWQ1fMZ6bnRD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8406b6f74909babd |
|
VISUAL
aHash
|
00000000ffffffff |
|
VISUAL
dHash
|
d4d5f5f1b20c3223 |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0e2000001c0 |
|
VISUAL
cropResistant
|
64d4c0a0c6ec78d0,f9f5f20d120a2323,f4ddddf5f6f9f5f2 |
• Threat: Brand impersonation phishing.
• Target: PayPal users.
• Method: The site uses PayPal's branding to appear legitimate.
• Exfil: N/A, there is no form to exfiltrate from in the cropped image.
• Indicators: Domain mismatch (not paypal.com), PayPal logo.
• Risk: HIGH - Attempt to deceive users by impersonating a known brand.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain