Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D4B11F35460424BA0BA3BDE8DA937E1561CFC01AD6DF0718A5E84BAD1BC2FF4D482F61 |
|
CONTENT
ssdeep
|
96:dH3OuQRq8UpkMIf5xvL6fSWrI9c5chHPxKOC87D:xmqnpkMIf5ASWAFCkD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c6ce3971486ec699 |
|
VISUAL
aHash
|
00007e7e7e7e0000 |
|
VISUAL
dHash
|
2bf0ccecccccf007 |
|
VISUAL
wHash
|
007e7e7e7e7e0000 |
|
VISUAL
colorHash
|
02000000007 |
|
VISUAL
cropResistant
|
8c8c8c8c8e8e9696,2bf0ccecccccf007,2e274d189903060d,00100cb2b20c1000 |
• Threat: Credential harvesting phishing kit
• Target: Mexican passport applicants
• Method: Fake passport application form stealing personal data
• Exfil: Data likely sent to unknown server
• Indicators: Non-official domain, recent domain registration, obfuscated JavaScript
• Risk: HIGH - Immediate personal data theft
Pages with identical visual appearance (based on perceptual hash)