Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10D52C8B7B111F83B06138AE1B5A5AB1EB6A3935DC81F106119BC53E02FECD91A48F742 |
|
CONTENT
ssdeep
|
192:5lv+Hm+iQ6/ogxPoe6eAZ+YaEs99tTujYxauYI/YT5Y1:3+G+pQQhvs3tTujYx9YuYVY1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b13167663470cece |
|
VISUAL
aHash
|
c3c3ffcfffffffff |
|
VISUAL
dHash
|
8e9e60900c280000 |
|
VISUAL
wHash
|
c0c0cccce7f33333 |
|
VISUAL
colorHash
|
070000001c2 |
|
VISUAL
cropResistant
|
8e9e60900c280000,71ccd43313941561 |
โข Threat: Phishing
โข Target: Canada Post customers
โข Method: Impersonation and malicious URL redirection
โข Exfil: The linked URL likely leads to a site stealing credentials or personal information.
โข Indicators: Google Form with Canada Post branding, suspicious URL redirect.
โข Risk: HIGH
The attacker impersonates Canada Post to trick the user into clicking a link that redirects to a malicious website, likely designed to steal credentials.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain