Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T128B2017094B5B63F009F7391A7386709A3D39383CB520BE567F8836D5B8AE84DC23169 |
|
CONTENT
ssdeep
|
192:bixLoxwz77qKHv/ySchJrVUmZGkofXTCReWyRMOsUFf9kIT/JO:mx8xw7pvKpJrVUIGk6+TxFUH/JO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ed6dc19a92963c92 |
|
VISUAL
aHash
|
f1c1c1ffff83c3ff |
|
VISUAL
dHash
|
23030727392b1342 |
|
VISUAL
wHash
|
e18181d7c781c3fb |
|
VISUAL
colorHash
|
07200000006 |
|
VISUAL
cropResistant
|
23030727392b1342,67e5258787c39767,0000db6464649b24 |
• Amenaza: Phishing
• Objetivo: Clientes de DPD
• Método: Impersonación de la página de seguimiento de DPD
• Exfil: date.php (probablemente cosecha de credenciales)
• Indicadores: Dominio sospechoso, Javascript ofuscado, acciones de formulario, marca DPD
• Riesgo: Alto
The site impersonates DPD to obtain sensitive information like tracking numbers. The form data is then submitted to `date.php`. The tracking number is likely misused to obtain more information or credentials.
After entering the tracking number, the attacker could redirect user to a malicious page or download a malware that steal information from the victim's device
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain