Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C87174A7B06424375A2749C879F6076931D2A03EE3831C78E7FC02AC43DDF9AB816027 |
|
CONTENT
ssdeep
|
96:VgRYCfDEmesqPCwk2zzLuQq/pT8eQ5awq+QPiI5TPNUV42k+:6RYADdqVkk3OvQPqY3j |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b11cce3133ce4e33 |
|
VISUAL
aHash
|
00cfcfc7cfdfffff |
|
VISUAL
dHash
|
a0181c1c1a380000 |
|
VISUAL
wHash
|
008f87870000f0f0 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
a0181c1c1a380000 |
• Threat: Phishing attempt impersonating Royal Bank
• Target: Royal Bank customers
• Method: Fake account hold notification to steal login credentials
• Exfil: Potential data exfiltration via obfuscated JavaScript
• Indicators: Free hosting on Google Docs, domain mismatch, urgent language
• Risk: HIGH - Immediate risk of credential theft
Found 10 other scans for this domain