Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14FD1F2A681D58477411383DFF2AAAB17B1F0855CCA466A12F6FD57AC97EBC20B412F01 |
|
CONTENT
ssdeep
|
96:Jb2UNRKIGo1YI4jNXiJ3FLBYkGlWkGj92lrYXz5nPSl48/vxDY:Jb2UTzN1YIG0eU96RlY |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9a1b29bd96878786 |
|
VISUAL
aHash
|
01003c3cffffffff |
|
VISUAL
dHash
|
9f13cd6d603683d8 |
|
VISUAL
wHash
|
00003c0cffdfc37f |
|
VISUAL
colorHash
|
06240018000 |
|
VISUAL
cropResistant
|
9f13cd6d603683d8,3333b2909e8adee0,13535b2753636323,0000081010100800 |
• Threat: Package delivery scam/phishing attack
• Target: DHL customers
• Method: Fake DHL tracking page requesting payment to complete delivery
• Exfil: Data likely sent to a PHP script on the attacker's server
• Indicators: Unofficial domain, payment request, urgency message
• Risk: HIGH - Financial loss and potential data theft
Pages with identical visual appearance (based on perceptual hash)