Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16951DBA0B3C46A5E94D0458BE1007FD5A3D0D0AA837139045E5BAF5FECCD0F5A9672EE |
|
CONTENT
ssdeep
|
48:fHfaRBRRZGMB+Rv441RrVCVv7kKG6bvtXV26/+SlRdaxrbEnCMj1a:SjzBmwIukKGOvxVldHI18j1a |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
da4ba5a5276e4a58 |
|
VISUAL
aHash
|
ffff000000ffffff |
|
VISUAL
dHash
|
c4d939851422340c |
|
VISUAL
wHash
|
ffff00000000ffff |
|
VISUAL
colorHash
|
06000038000 |
|
VISUAL
cropResistant
|
c4d939851422340c |
• Threat: Credential harvesting phishing
• Target: DHL users
• Method: Fake login form to steal credentials (email, password)
• Exfil: Likely to a malicious server (unknown)
• Indicators: Domain mismatch, login form, impersonating DHL
• Risk: HIGH - Credentials can be stolen immediately
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain