Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C3B2027094B5B63F009F7391A7386709A3D39783CB520BE567F8936D4B8AE84DC23169 |
|
CONTENT
ssdeep
|
192:bixLoxwz77qKHv/ySchJrVUmZGkoVXTCReWyRMOsUFf9kIT/JO:mx8xw7pvKpJrVUIGk4+TxFUH/JO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ed6dc19a92963c92 |
|
VISUAL
aHash
|
f1c1c1ffff83c3ff |
|
VISUAL
dHash
|
23030727392b1342 |
|
VISUAL
wHash
|
e18181d7c781c3fb |
|
VISUAL
colorHash
|
07200000006 |
|
VISUAL
cropResistant
|
23030727392b1342,67e5258787c39767,0000db6464649b24 |
โข Threat: Phishing
โข Target: DPD customers
โข Method: Impersonation to steal data
โข Exfil: date.php (form action)
โข Indicators: Mismatched domain, form, suspicious messages.
โข Risk: HIGH
The attackers are impersonating DPD to trick users into providing their tracking number and other information, potentially leading to further compromise.
The website uses a form action (date.php) to collect the user data, indicating an attempt to steal sensitive information.
Pages with identical visual appearance (based on perceptual hash)