Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T129D1E1A149D78637211B4FFFB1AAA793B1F08D58C6466A11A3FC43E85397C30B495B03 |
|
CONTENT
ssdeep
|
96:rb2UNSU8mGv8FIdflfYjNXs33FLP1bYhcVHpWgZ98ijPM3o5S/48/vkDY:rb2UQRmU8FIdfBme1MhcVHpPZ9KjHmY |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9a1b29bd96878786 |
|
VISUAL
aHash
|
01003c3cffffffff |
|
VISUAL
dHash
|
9f13cd69603f93c8 |
|
VISUAL
wHash
|
00003c04ffc3ff7f |
|
VISUAL
colorHash
|
06240018000 |
|
VISUAL
cropResistant
|
9f13cd69603f93c8,3333b2909e8adee0,13535b2753636323,0000081010100800 |
• Amenaza: Phishing
• Objetivo: Clientes de DHL
• Método: Suplantación y solicitud de pago
• Exfil: ./loading.php (basado en acción de formulario)
• Indicadores: Dominio sospechoso, solicitud de pago, marca DHL
• Riesgo: ALTO
The attacker attempts to steal the victim's payment information by posing as DHL and requesting a payment for delivery. The user is redirected to a fake payment gateway or asked to input their information directly on the page.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain