Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T150D2F7DAB691713603E36071813F230F3377669B78068458716ED7C11F6AD8EA613BAD |
|
CONTENT
ssdeep
|
384:R5cs8amBodiSinmAAmKriNpnjyMkg8XMtExRN1w29JIOzahXtO2nJ6P:R+iM7nmBmDijgSWuanfJ6P |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e666c666cccc9833 |
|
VISUAL
aHash
|
e7e7e7e7e7e7ffff |
|
VISUAL
dHash
|
2d4d0f0d4d0d0008 |
|
VISUAL
wHash
|
27278080a581ffff |
|
VISUAL
colorHash
|
07400018000 |
|
VISUAL
cropResistant
|
2d4d0f0d4d0d0008 |
• Threat: Phishing campaign impersonating Amazon.
• Target: Amazon customers.
• Method: Offering a free gift or prize for completing a simple test.
• Exfil: Unknown, likely data harvesting through further interaction or data entry on subsequent pages.
• Indicators: Non-matching domain, prize offer, request to answer questions.
• Risk: MEDIUM - Potential for data harvesting or further phishing attempts.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain