Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T153131233C0132132524B56E5F8A077592293C32EDF4708891B7CDB913BEBDAA7987A5D |
|
CONTENT
ssdeep
|
768:M3RR/CNpuL13/TnJ6a+co6v+c6o4IE/Irb5dEoGEqOzVWsPk6TRC1mX6nwCTT:4RRaNEL13/jJ6fco6Gc6o4L/Irb5dEoI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b71d0d1715159d55 |
|
VISUAL
aHash
|
26e7ffe7e7e7e7ff |
|
VISUAL
dHash
|
cc0d484c4c4c4c04 |
|
VISUAL
wHash
|
00c3c3c3c3c3c3ff |
|
VISUAL
colorHash
|
07000030000 |
|
VISUAL
cropResistant
|
cc0d484c4c4c4c04 |
• Threat: Account verification phishing
• Target: Amazon users
• Method: Uses a document on Google Docs to impersonate Amazon and trick users into clicking a verification button, likely leading to a credential harvesting site.
• Exfil: Unknown, likely redirects to a phishing site.
• Indicators: Google Docs URL, generic security alert language, call to action button.
• Risk: HIGH - Could lead to account compromise and data theft.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain