Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T194B2027094B5B63F009F7391A7386709A3D39783CB520BE567F8936D4B8AE84DC23169 |
|
CONTENT
ssdeep
|
192:bixLoxwz77qKHv/ySchJrVUmZGkoVXTCReWyRMOsUFf9kITIJO:mx8xw7pvKpJrVUIGk4+TxFUHIJO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ed6dc19a92963c92 |
|
VISUAL
aHash
|
f1c1c1ffff83c3ff |
|
VISUAL
dHash
|
23030727392b1342 |
|
VISUAL
wHash
|
e18181d7c781c3fb |
|
VISUAL
colorHash
|
07200000006 |
|
VISUAL
cropResistant
|
23030727392b1342,67e5258787c39767,0000db6464649b24 |
• Amenaza: Phishing
• Objetivo: Clientes de DPD
• Método: Suplantación y recopilación de credenciales
• Exfil: date.php
• Indicadores: Dominio sospechoso, Formulario para ingresar un número de seguimiento, Javascript ofuscado
• Riesgo: Alto
The attacker attempts to steal login credentials by prompting the user to enter their tracking number, likely with a subsequent form requesting more information. This is coupled with the promise of resending a package.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain