Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16721773058159C2AD935C3B15FD1E94517BA8F41CE493C40D5D4775F0BDAC98D86F744 |
|
CONTENT
ssdeep
|
24:bs6sCIyBKTRtxosGH7szaD1imqGDplYSZqupPVMSV:46ooKnq/qGDLVXV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
db8c643199ce6699 |
|
VISUAL
aHash
|
f0f0f8f8f8e0c0c0 |
|
VISUAL
dHash
|
0000282810080000 |
|
VISUAL
wHash
|
f8f0f8f8f8e0e0c0 |
|
VISUAL
colorHash
|
07003018000 |
|
VISUAL
cropResistant
|
0000282810080000 |
• Threat: Potential phishing targeting Vipps MobilePay users.
• Target: Vipps MobilePay users, potentially in Denmark
• Method: Fake login form is used to collect phone numbers.
• Exfil: Data exfiltration target is unknown, form action to ./post/index.php
• Indicators: Unofficial domain, Danish language, requests phone number.
• Risk: MEDIUM - Potential credential harvesting.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain