Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C202F630A081AB3B00C792E6DF355B9EB3E48299DB937B0853F58759CEC9E4BDD12190 |
|
CONTENT
ssdeep
|
96:TtxbJfWM2QtuJlYc5QoH3M6YFBeDaRhLOJ1+izAuaLdEynqqkj2u0:BTfWjlYcioX0FBeDcLOJ1+ikuaODqc2J |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f01f4e25ce8b6287 |
|
VISUAL
aHash
|
000000ffc3c7fffc |
|
VISUAL
dHash
|
f15cd89995959995 |
|
VISUAL
wHash
|
000000ffc7e5fffc |
|
VISUAL
colorHash
|
06201008600 |
|
VISUAL
cropResistant
|
8282c2d2d2c28282,54d8995595959895,e9d0151cc8d89892,d1d1515151515119,f8e4e3e2eae87476,981e3ba185c4b909,1b0d0d0d0d2d3535,070e4cce0416c6e7,c9f199ac3e8fc38b,0000023030317169 |
• Threat: Phishing
• Target: Amazon customers
• Method: Impersonation
• Exfil: Not applicable
• Indicators: Free hosting, brand logo
• Risk: HIGH
The attacker aims to steal user credentials by creating a fake login page that mimics the look of the legitimate Amazon website.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain