Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F751CAA0B3C4665EE4D0418BE1007FD5A3D0D1AA93B138045E5BAF5FE8CE0F599672EE |
|
CONTENT
ssdeep
|
48:fHfaRBRRZGMB+RvR41RrVCVv7kKG6bvtXV26/+SlREaxr9+uCDj1a:SjzBmZIukKGOvxVldHHLej1a |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
da4ba5a5276a4a5a |
|
VISUAL
aHash
|
ffff000000ffffff |
|
VISUAL
dHash
|
445939150422340c |
|
VISUAL
wHash
|
ffff00000000ffff |
|
VISUAL
colorHash
|
06000038000 |
|
VISUAL
cropResistant
|
445939150422340c |
• Threat: Phishing
• Target: DHL customers
• Method: Impersonation
• Exfil: ./log2345678.php
• Indicators: Mismatched domain, login form, Chinese text
• Risk: HIGH
The attacker is attempting to steal user credentials by presenting a fake DHL login page.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain