Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T194C266E29D84E0735192C1E0EA7E2F69F2A1D65ECBCB8B00DBE953449FDBC55DC250A0 |
|
CONTENT
ssdeep
|
384:nqs/6mPS/oW9SIw/FolvL7taWjr4NX8cTMPSFb8oJ1+iurXAnnZRHCNLQNLbEw:36aOOIw/Fw7739P0dX |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ca0d4a0f5b5b2dd2 |
|
VISUAL
aHash
|
00c1fafcfff3fcf0 |
|
VISUAL
dHash
|
c117a2d085578585 |
|
VISUAL
wHash
|
00f1f0fcff80f4d0 |
|
VISUAL
colorHash
|
07600000080 |
|
VISUAL
cropResistant
|
828282e2e2828082,1382d0b907558595,f1c007939717a2a2,7161e3e32068b53c,1b0d0d0d0d2d393d,0f0c4c4c0406c667,c9f199a83c8fc38b |
• Amenaza: Phishing
• Objetivo: Clientes de Amazon
• Método: Suplantación a través de un sitio web falso
• Exfil: No hay robo de datos explícito en esta imagen, pero puede haber elementos de formulario en la versión completa.
• Indicadores: Hosting gratuito y logo de marca
• Riesgo: ALTO
The attacker aims to steal user credentials by creating a fake Amazon login page.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain