Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T176B2017094B5B63F009F7391A7386709A3D39383CB520BE567F8836D5B8AE84DC23169 |
|
CONTENT
ssdeep
|
192:bixLoxwz77qKHv/ySchJrVUmZGkoRXTCReWyRMOsUFf9kIT/JO:mx8xw7pvKpJrVUIGk0+TxFUH/JO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e96bc99c962466c3 |
|
VISUAL
aHash
|
f9e9e1f7ff81c3ff |
|
VISUAL
dHash
|
2b030327382b1342 |
|
VISUAL
wHash
|
a9a1e1c7c78181fb |
|
VISUAL
colorHash
|
07000000006 |
|
VISUAL
cropResistant
|
2b030327382b1342,696969c9692b3734,337367e7cdcd8d1d,0000db6464649b24 |
• Threat: Package delivery redirection phishing
• Target: DPD customers
• Method: Fake tracking page prompts for delivery address update
• Exfil: Unknown, likely to a database or email
• Indicators: Non-DPD domain, generic error, prompts for address
• Risk: HIGH - Data theft and potential identity theft
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain