Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12F52F973B122BC3B02138AE5B499BB1EB5A3924ECC1F106159BC13D12FECD91B09B746 |
|
CONTENT
ssdeep
|
192:Flh+Hm+iQvI0ogxPorL+AZ+YaEs98tTuBcqauYI/YT5Y1:F+G+UJQQfvs2tTuBcq9YuYVY1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b13167663470cece |
|
VISUAL
aHash
|
c3c3ffcfffffffff |
|
VISUAL
dHash
|
8e9e60900c280000 |
|
VISUAL
wHash
|
c0c0cccce4f8fc7c |
|
VISUAL
colorHash
|
070000001c2 |
|
VISUAL
cropResistant
|
8e9e60900c280000,71ccd43313941561 |
โข Threat: Impersonation/Phishing
โข Target: Canada Post customers
โข Method: Deceptive Google Form.
โข Exfil: The IP address provided. Potential redirection to malicious site.
โข Indicators: IP address in link, brand impersonation.
โข Risk: High
The attacker creates a Google Form designed to look like a communication from Canada Post. The user is prompted to click a malicious link to resolve a delivery issue.
The email uses a sense of urgency (delivery failed) to trick the user into clicking the link.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain