Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1FED183E4AA3CB73D140F87ACCB6EB681235FA0EDF3170554638E56B10587E6CE946C54 |
|
CONTENT
ssdeep
|
96:e35KFSe0BlTSc/Q04JvN/Un4jFSe0BlTSc/Q04JWatPTOYuFA9ed/WqtuGO:ZAN3J4JvBAN3J4J/iVW9eJW4uGO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cccc3333cccc2733 |
|
VISUAL
aHash
|
0000181818180000 |
|
VISUAL
dHash
|
100c32b2b2320c10 |
|
VISUAL
wHash
|
0c0c3c3c18180000 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
100c32b2b2320c10 |
• Threat: Bot check bypass phishing
• Target: VK users to bypass bot detection
• Method: Displays a fake bot check window to mislead users
• Exfil: Unknown, potentially redirecting to another malicious site
• Indicators: Domain mismatch, obfuscated JS, non-standard subdomain
• Risk: HIGH - Can lead to account compromise or malware infection
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain