Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17A349331D5A41033052B2ACDF4B8B79DD7D3E38FDA4688C295E943A80BE1DA8B7365D4 |
|
CONTENT
ssdeep
|
1536:NN4tMzRTCP3tSMV1dB3QLmZZCdw1lToSiblsG1BslU4skPas/aos4cYsoAlsW8Fa:XcWRHu3QiDlUbgRg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e8681797877a4743 |
|
VISUAL
aHash
|
38c1c1c1ffffcdff |
|
VISUAL
dHash
|
f8938393c099998b |
|
VISUAL
wHash
|
00c1c1c1ffffc1c9 |
|
VISUAL
colorHash
|
17207000000 |
|
VISUAL
cropResistant
|
8282c2d2d2828282,93938393c099998b,d0d9e8d8c80a922a,0000000000000000,36dea4a9ac6fe7a7,9fbab42870e1c38f,795d930c48191539,3333537353133333 |
โข Threat: Phishing
โข Target: Amazon users
โข Method: Impersonation via free hosting
โข Exfil: Unknown
โข Indicators: Free hosting and brand logo
โข Risk: Medium
The attacker likely wants to steal your Amazon login credentials. They use a website that looks like the Amazon login page to trick you into entering your username and password, which the attacker then collects.
21fYSeFelaL.jsFound 6 other scans for this domain