Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T132C2227094B5A57F009F72D1A738A705A3C39382CB520BE567FC936D8BCAE84DC23569 |
|
CONTENT
ssdeep
|
384:2x8xw7pvKpJrVUatKroxNaNp8+XxFUHIJO:txbrKr2sRUHF |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
eb6b199094b66663 |
|
VISUAL
aHash
|
f9a9e1f7ffffff9f |
|
VISUAL
dHash
|
2b23032f3223032b |
|
VISUAL
wHash
|
8981e1df8383c39f |
|
VISUAL
colorHash
|
07600000003 |
|
VISUAL
cropResistant
|
2b23032f3223032b,696969c9692b3734 |
• Ameaça: Phishing
• Alvo: Clientes DPD
• Método: Impersonação e roubo de dados baseados em formulários
• Exfil: action.php (provável)
• Indicadores: Domínio suspeito, solicita detalhes do cartão de crédito, javascript ofuscado.
• Risco: Alto
The attacker aims to steal credit card details by mimicking the DPD website. The victim is tricked into entering their sensitive information in a form that submits the data to a malicious server.
The attacker leverages the trust in the DPD brand and the checkout process to deceive the user.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain