Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T163815220C437497A31B9B1E4EA953B1990C7C70BCB812BE091B4432E8AECEC9AC27481 |
|
CONTENT
ssdeep
|
96:nEaoB/Bp9VS9NiJsUW23Jxj3qwElFmlOjRIbVymdctZMTgYFb3:ToB/Bp989NiJsnOjmmMYp |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e65b992c998caa9c |
|
VISUAL
aHash
|
f0e0e0e0e0e0f0e0 |
|
VISUAL
dHash
|
41414d4f0d0d454d |
|
VISUAL
wHash
|
f0f0f0f0e0e0f1f1 |
|
VISUAL
colorHash
|
0e000680000 |
|
VISUAL
cropResistant
|
41414d4f0d0d454d,3749711d55697331,c7a7b3bc1eceecf1,c486d68e8edab0f8,0002527c76533ca0 |
• Threat: Potential account compromise
• Target: ActiveCampaign users
• Method: Standard username/password login form
• Exfil: No explicit data exfiltration detected.
• Indicators: Legitimate ActiveCampaign domain.
• Risk: LOW - Standard login page; risk dependent on password security.
Pages with identical visual appearance (based on perceptual hash)