Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T110131233C0532032524B52E5F8A0775A2293C32EDF4708491B7CDB913BEBDAA7987A5D |
|
CONTENT
ssdeep
|
768:ckRJ/CtieL13/kkJ6a+co6v+c6o4IE/Irb5dEoGEqOzVWsPk6TRC1mX6nw3GTT:bRJatBL13/3J6fco6Gc6o4L/Irb5dEo0 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b7155d1515159d55 |
|
VISUAL
aHash
|
26e7ffe7e7e7e7ff |
|
VISUAL
dHash
|
cc0d484c4c4c4c20 |
|
VISUAL
wHash
|
00e3c3c3c3c3c3fb |
|
VISUAL
colorHash
|
07000030000 |
|
VISUAL
cropResistant
|
cc0d484c4c4c4c20 |
• Ameaça: Phishing
• Alvo: Usuários da Amazon
• Método: Imitação por meio do Google Docs
• Exfil: Provavelmente rouba credenciais via Javascript
• Indicadores: Domínio do Google Docs, alegações suspeitas
• Risco: Alto
The attacker likely uses a phishing kit hosted on a Google Docs document. The goal is to trick the user into entering their Amazon credentials on a fake form or through JavaScript-based theft.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain