Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13AD1CDBD41DB8463013387DFB1EAA712B1F1855ACE456A11A5FD4BAA73DFC18BCC2A01 |
|
CONTENT
ssdeep
|
96:+Tb2UNGvHA/Gyr7vNbky4NDjNXsg3FLXVZVb5n73kWVW5Ng9PSX5vmcSb48/vLDY:Ab2U8mzJQy4NtN5gg9vLnY |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9a1b29bd96878786 |
|
VISUAL
aHash
|
01003c3cffffffff |
|
VISUAL
dHash
|
9f13cd69603f93c8 |
|
VISUAL
wHash
|
00003c04ffc3ff7f |
• Threat: Delivery scam phishing
• Target: DHL customers receiving parcels
• Method: Request for payment to complete delivery
• Exfil: Likely to be payment card details
• Indicators: Domain mismatch, urgency tactics, small payment request
• Risk: HIGH - Potential financial loss if payment details are entered
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain