Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14554E7F3929400B71227CBDAF57A674D21E3F14DEF0A85809AE807689FF6D46A137835 |
|
CONTENT
ssdeep
|
3072:OVgTaOHhnSCADgCWDJo2xDaDv7hiTwYwE0m3dThToXX6URv:agTa6hnSCkgCWDJo2xDaDv7himX6URv |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a5c55992d2d0d997 |
|
VISUAL
aHash
|
7f0303070f0f0300 |
|
VISUAL
dHash
|
ea77f6afeeff7f3f |
|
VISUAL
wHash
|
ff071b073f1f0700 |
|
VISUAL
colorHash
|
1b602000000 |
|
VISUAL
cropResistant
|
808082d2d2c28080,e1b0b891b1b0ab91,7ad6a692d0818707,b7f3e3d899dbfbff,ea77f6afeeff7f3f |
โข Threat: Phishing
โข Target: Amazon users
โข Method: Impersonation via free hosting
โข Exfil: Likely user credentials via forms
โข Indicators: Free hosting, brand logo.
โข Risk: HIGH
The attackers are likely trying to steal user login credentials by creating a fake login page that mimics the Amazon Prime Video interface. User credentials are then sent to the attackers.
21fYSeFelaL.jsFound 7 other scans for this domain