Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T168C2337094B5A57F009F72D1A738A705A3C39382CB520BE567FC936D8BCAE84DC23569 |
|
CONTENT
ssdeep
|
384:2h8xw7pvKpJrVUatsBoxNaNp8+XxFUH/JO:RxbrsB2sRUHc |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e96b999094b66663 |
|
VISUAL
aHash
|
f9a9e1d7ffffff9f |
|
VISUAL
dHash
|
2b03032f3223032b |
|
VISUAL
wHash
|
8981e1df8383c39f |
|
VISUAL
colorHash
|
07600000003 |
|
VISUAL
cropResistant
|
2b03032f3223032b,696969c9692b3734 |
The phishing kit employs form-based credential harvesting to capture login credentials for DPD accounts. It also includes a Card Stealer module to intercept payment card details (e.g., card number, expiry date, CVV) submitted by victims under the guise of a legitimate transaction or verification process.
The OTP Stealer module captures one-time passwords (OTPs) sent via SMS or authenticator apps, enabling attackers to bypass multi-factor authentication (MFA) and gain unauthorized access to victim accounts.
Highly obfuscated JavaScript file with no direct function names or strings extracted.
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain