Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10251EBA0B3C4665EE8D0418BE1007FD5A3D0D06A837128044E5BAF5FE8CE0F5E9672EE |
|
CONTENT
ssdeep
|
48:fHfaRBRRZGMB+RvR41RrVCVv7kKG6bvtXV26/+SlREaxr9+p3CmXj1a:SjzBmZIukKGOvxVldHHLaPXj1a |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
da5ba5a5276e4a18 |
|
VISUAL
aHash
|
ffff000000ffffff |
|
VISUAL
dHash
|
445939051422340c |
|
VISUAL
wHash
|
ffff00000000ffff |
|
VISUAL
colorHash
|
06000038000 |
|
VISUAL
cropResistant
|
445939051422340c |
• Threat: Phishing
• Target: DHL customers
• Method: Impersonation of DHL login page
• Exfil: ./log2345678.php (form action)
• Indicators: Mismatched domain, request for credentials, brand logo.
• Risk: High
The attacker uses a fake login form to steal user credentials. The form submits data to a malicious server (./log2345678.php).
Found 10 other scans for this domain