Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F551CAA0B3C46A5E98D0458BD1003FD5A3D0D1AA937138045E5FAF5FE8CD0F599672EE |
|
CONTENT
ssdeep
|
48:fHfaRBRRZGMB+Rv441RrVCVv7kKG6bvtXV26/+SlRdaxrbEuCDj1a:SjzBmwIukKGOvxVldHI1Aj1a |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
da4ba5a5276a4a5a |
|
VISUAL
aHash
|
ffff000000ffffff |
|
VISUAL
dHash
|
c4d939950422340c |
|
VISUAL
wHash
|
ffff00000000ffff |
|
VISUAL
colorHash
|
06000038000 |
|
VISUAL
cropResistant
|
c4d939950422340c |
• Threat: Credential harvesting phishing kit
• Target: DHL users internationally
• Method: Fake login form stealing passwords
• Exfil: Data sent to suspicious PHP file
• Indicators: Unrelated domain, suspicious form action, free hosting
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)