Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T170D1FE7060509D3B4283C6D4B3B9AB9F7394C346EA87565A63F4C39C0FE3E56CC1A226 |
|
CONTENT
ssdeep
|
96:nIpkCGTHRPyISakrwkMns39TbJG9KjsWsjOVo0U2gs0sjOVZOVJQ6Q6ynQjNsjOg:9BSak8C9TbJG9ah61ZOVJQyyQjhu |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9c497326cc99d966 |
|
VISUAL
aHash
|
18001818191f0f9f |
|
VISUAL
dHash
|
7161713331727d38 |
|
VISUAL
wHash
|
191818181f1f1fff |
• Threat: Credential harvesting phishing targeting Copart users.
• Target: Copart account holders.
• Method: Fake sign-in page to steal user credentials (email and password).
• Exfil: Likely to a remote server controlled by the attacker, but details are unavailable without further code analysis.
• Indicators: Mismatched domain 'sso-security.com', which is different from the official Copart domain (copart.com).
• Risk: HIGH - The site attempts to steal login credentials, potentially leading to account compromise.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain