Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C89167B09442BA3711D7C3E2EF39A75F73D58294DA83570913F8C39C8ACAE4ADE61854 |
|
CONTENT
ssdeep
|
96:TPwvktoFOD+R1Lcj5S6JmA+A7tVu2La/x/x/x/84KB:Evkto9Vf/x/x/x/84KB |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8e19394e5fc80f4e |
|
VISUAL
aHash
|
000301ff30ffffff |
|
VISUAL
dHash
|
72dbdfb46465a5d6 |
|
VISUAL
wHash
|
0001007f10fffffb |
|
VISUAL
colorHash
|
07206008000 |
|
VISUAL
cropResistant
|
8282e0e0e0e28282,dbdf9b6465a525d6,63db1adbdbef9d9e,d9e6766663697926,4c9736666d595932,7e6c4cd9d1dbb3b3,61694d645e5e5e1e,1b0d04040d040c1d |
Fake Amazon page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.