Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B2516630A002F93700E7C3E5EB39AB5BB2D48691DB03171553F9C39C8BD6E8AEC65554 |
|
CONTENT
ssdeep
|
48:Tt1lSwqRTYJJolZdFCDT20aZC4Z5FY+dg5yfY35RYP50YP:TtvxJJobDCDTnIykWpJ+xVP |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ed4f8a45c5924c6d |
|
VISUAL
aHash
|
000000fff3c2ffff |
|
VISUAL
dHash
|
6333338c56969f00 |
|
VISUAL
wHash
|
0000007fe2daffff |
|
VISUAL
colorHash
|
0b201008041 |
|
VISUAL
cropResistant
|
8282e2eaeae28282,6c45c567a43434d2,0000000000000000,310040070f170021,b9d656b39b160016,f1d0b0a8ccc8f2f4,6273733333331394,01010933f1c87070,425b59cca6e6a6ae,1018180818080c2c,cbc3e0794be13903,baf3f9f9f9d5d551 |
• Ameaça: Phishing
• Alvo: Usuários da Amazon
• Método: Impersonação por meio de um site clonado em hospedagem gratuita
• Exfil: Desconhecido (provavelmente credenciais ou informações de pagamento)
• Indicadores: Hospedagem gratuita, logotipo da Amazon.
• Risco: Alto
The attacker aims to steal user credentials by creating a fake Amazon login page.
Pages with identical visual appearance (based on perceptual hash)