Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T169131233C0132133525B52E5F8A0775A2293C32EDE4708891B7CDB913BEBDAA798795D |
|
CONTENT
ssdeep
|
768:6PR3/CNiiL13/9DJ6a+co6v+c6o4IE/Irb5dEoGEqOzVWsPk6TRC1mX6nwCTT:6R3aN5L13/tJ6fco6Gc6o4L/Irb5dEoI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b7155d1515159d55 |
|
VISUAL
aHash
|
26e7ffe7e7e7e7ff |
|
VISUAL
dHash
|
ca0d484c4c4c4c04 |
|
VISUAL
wHash
|
00e3c3c3c3c3c3fb |
|
VISUAL
colorHash
|
07000030000 |
|
VISUAL
cropResistant
|
ca0d484c4c4c4c04 |
⢠Threat: Phishing
⢠Target: Amazon users
⢠Method: Impersonation via email.
⢠Exfil: Javascript form submission and Obfuscation detected
⢠Indicators: Domain mismatch, urgent call to action, and form submission.
⢠Risk: HIGH
The attacker sends an email designed to look like it's from Amazon. It uses the Amazon logo and branding to build trust and deceive the user into clicking a link, which leads them to a phishing site.
The user is directed to a login page that mimics the actual Amazon login. They will be prompted to enter username and password. This will allow the attacker to harvest the victim's credentials.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain