Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13DB2F17094B5B63F009F7391A7386709A3D39783CB520BE567F8936D4B8AE84DC23169 |
|
CONTENT
ssdeep
|
192:bixLoxwz77qKHv/ySchJrVUmZGko5XTCReWyRMOsUFf9kIT/JO:mx8xw7pvKpJrVUIGkM+TxFUH/JO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e96b899c962666c3 |
|
VISUAL
aHash
|
f9e9e1f7ff81c3ff |
|
VISUAL
dHash
|
2b030327382b1342 |
|
VISUAL
wHash
|
a9a1e1c7c78181fb |
|
VISUAL
colorHash
|
07000000006 |
|
VISUAL
cropResistant
|
2b030327382b1342,696969c9692b3734,337367e7cdcd8d1d,0000db6464649b24 |
• Threat: Package tracking phishing scam
• Target: DPD customers
• Method: Fake tracking page to steal tracking number or personal information
• Exfil: Unknown, potential exfiltration through date.php
• Indicators: IP address domain, obfuscated JS, future dates, form actions to date.php.
• Risk: HIGH - Potential for data theft and further malicious activity.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain