Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1FFC2227094B5A57F009F72D1A738A705A3C39382CB520BE567FC936D8BCAE84DC23569 |
|
CONTENT
ssdeep
|
384:2x8xw7pvKpJrVUatKroxNaNp8+XxFUH/JO:txbrKr2sRUHc |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ed6d6d9392923c30 |
|
VISUAL
aHash
|
f1c181ffffffff9f |
|
VISUAL
dHash
|
230307233b23032b |
|
VISUAL
wHash
|
818181dfd3c3c39f |
|
VISUAL
colorHash
|
07c00000002 |
|
VISUAL
cropResistant
|
230307233b23032b,67e5258787c39767 |
• Ameaça: Phishing de cartão de crédito
• Alvo: Clientes DPD
• Método: Impersonificação por meio de formulário de pagamento falso em um domínio malicioso.
• Exfil: action.php (provavelmente)
• Indicadores: Domínio malicioso, solicitação de informações de cartão de crédito, ofuscação de JavaScript.
• Risco: ALTO
The attacker attempts to steal credit card details by impersonating DPD and presenting a fake payment form on a malicious domain.
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain