Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T176618A715449D8BF82C3C2E086783B5E36C1CA86EE2B1A9886F4D30D1FEBD90ED07155 |
|
CONTENT
ssdeep
|
48:llMLEY0OW2IbSAwwy6qj4OQHj4OQgj4OQtj4OQ8pt8BjH5c7BjHY3BjHM/9MBjH3:LTaw9ycAzuozscqK0 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e666c666cccc9833 |
|
VISUAL
aHash
|
e7e7e7e7e7e7ffff |
|
VISUAL
dHash
|
2d4d0f0d4d0d0008 |
|
VISUAL
wHash
|
27278080a581ffff |
|
VISUAL
colorHash
|
07400018000 |
|
VISUAL
cropResistant
|
2d4d0f0d4d0d0008 |
• Amenaza: Phishing
• Objetivo: Clientes de Amazon
• Método: Incentivo de regalo para obtener información del usuario
• Exfil: Desconocido (es probable que los clics del usuario conduzcan a la recopilación de datos)
• Indicadores: Oferta de regalo, marca Amazon, encuesta corta
• Riesgo: Alto
The attacker uses the Amazon brand to lure victims. The site creates an initial hook with a welcoming message and a simple prompt to engage.
The attacker uses an incentive, a prize or gift, to entice the user to interact with the page.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain