Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16A92EEB059459A7790A3D2C09339A79BB6D0D615CA838702DFFD838C6F8FEA0DD32519 |
|
CONTENT
ssdeep
|
192:A9W/ngJoOaeo5Y+yH3gjULXD+BnnJZfuG08Eswu0j+xAn7D5LzuY2PCybluG08E4:A9+ngJ3aeUY+GMnJvV9Dn |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d25ad3554746c25b |
|
VISUAL
aHash
|
0080040000ffffff |
|
VISUAL
dHash
|
c03d2d6592d4609c |
|
VISUAL
wHash
|
00810400f4ffffff |
|
VISUAL
colorHash
|
03000e00000 |
|
VISUAL
cropResistant
|
808082c2d2c28080,3539e52694746094,d0d0c0d8e0069020,d1a9292dbd35a565 |
Fake Amazon page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.