Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10251EBA0B3C4665EE8D0418BE1007FD5A3D0D06A837128044E5BAF5FE8CE0F5E9672EE |
|
CONTENT
ssdeep
|
48:fHfaRBRRZGMB+RvR41RrVCVv7kKG6bvtXV26/+SlREaxr9+p3CmXj1a:SjzBmZIukKGOvxVldHHLaPXj1a |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
da5ba5a5276e4a18 |
|
VISUAL
aHash
|
ffff000000ffffff |
|
VISUAL
dHash
|
445939051422340c |
|
VISUAL
wHash
|
ffff00000000ffff |
|
VISUAL
colorHash
|
06000038000 |
|
VISUAL
cropResistant
|
445939051422340c |
• Amenaza: Phishing
• Objetivo: Clientes de DHL
• Método: Impersonación de la página de inicio de sesión de DHL
• Exfil: ./log2345678.php (form action)
• Indicadores: Dominio no coincidente, solicitud de credenciales, logotipo de la marca.
• Riesgo: Alto
The attacker uses a fake login form to steal user credentials. The form submits data to a malicious server (./log2345678.php).
Found 10 other scans for this domain