Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12741D5A1E0384D63429286F4B7C4A70A74C8D20FC7861D01A2FC9BF893EFC52AC35958 |
|
CONTENT
ssdeep
|
48:nb4UFnKc3cJC1PnoY9XmKKbTJgyii2H5f:nb4OK0cC1PossTeye |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d884a64d7e94b569 |
|
VISUAL
aHash
|
7f7d7d5c484868e0 |
|
VISUAL
dHash
|
c1d1919199909199 |
|
VISUAL
wHash
|
7f7d7d5c484848e0 |
|
VISUAL
colorHash
|
0ee00010000 |
|
VISUAL
cropResistant
|
c1d1919199909199,36396cc8c8989a6c,d3e1c1c5013379dd,27222381899923e3,1a1a1b1f0f8f8703,c3c38f4fe7b57575 |
• Threat: Credential harvesting phishing kit
• Target: DHL customers internationally
• Method: Fake login form stealing username and password
• Exfil: Potential data exfiltration via obfuscated JavaScript
• Indicators: Non-standard domain, obfuscation, login form
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 9 other scans for this domain