Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C2A1A57190048C3B569784EDBAB09B0A36C5C248CE4B8E46EBFC93EC8FD2C57EE25551 |
|
CONTENT
ssdeep
|
48:vd/cpZ8NzktQg5ZW0wX60TMlllq8CGC9SrFy853TS5QcHs6Z01h6mbzSJmREDLh:1/8Z8RktQAa6SUpCuFaskstSJmeh |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
993364cc3366ce99 |
|
VISUAL
aHash
|
201844243c3a1000 |
|
VISUAL
dHash
|
2c10184c30322408 |
|
VISUAL
wHash
|
303c0424fcf8fcfc |
|
VISUAL
colorHash
|
07200000006 |
|
VISUAL
cropResistant
|
2c10184c30322408 |
โข Threat: Phishing
โข Target: DPD users
โข Method: Impersonation via fake login page
โข Exfil: Phone number/email, package number
โข Indicators: Domain mismatch, form submission, request for sensitive info
โข Risk: High
The attacker is trying to collect phone number/email and package information from unsuspecting victims by impersonating DPD.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain