Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C30209E1C9BAD6B3149352F0C7753ED63FC09241C6621E00A3E5938AEAEED49DF6251C |
|
CONTENT
ssdeep
|
96:neIJ2pjUD2WWcTH6sMd+uya5oMDlel7lclxl6lnl4ltlDlGlLsMd+LgKm:e8jwtjlel7lclxl6lnl4ltlDlGlLUgKm |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f84f134a13875b4e |
|
VISUAL
aHash
|
00fbf8ffc0c0ffcf |
|
VISUAL
dHash
|
c11702b295959b9d |
|
VISUAL
wHash
|
00d1f0ffc0c0ff4e |
|
VISUAL
colorHash
|
07401010000 |
|
VISUAL
cropResistant
|
808082c2c2c28080,9313629695979b9d,e9c1036397176222,1c3d4cc6799d8523,981f3ba1c5c5b909,070e4c4e0606c667,41694d6c5e5e7e3e |
• Threat: Phishing
• Target: Amazon users
• Method: Fake login page
• Exfil: User credentials
• Indicators: Brand logo on free hosting
• Risk: High
The site impersonates Amazon to steal user credentials.
Users enter their credentials which are then sent to the attacker.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain