Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A2B2027094B5B63F009F7391A7386709A3D39783CB520BE567F8936D4B8AE84DC23169 |
|
CONTENT
ssdeep
|
192:bixLoxwz77qKHv/ySchJrVUmZGko5XTCReWyRMOsUFf9kIT/JO:mx8xw7pvKpJrVUIGkc+TxFUH/JO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bcc3c33c83693cc3 |
|
VISUAL
aHash
|
ffffffc3df8181ff |
|
VISUAL
dHash
|
39000027292b1342 |
|
VISUAL
wHash
|
8fffff8181818189 |
|
VISUAL
colorHash
|
07000000007 |
|
VISUAL
cropResistant
|
39000027292b1342,0000db6464649b24 |
• Threat: Package tracking phishing targeting DPD customers.
• Target: DPD customers globally.
• Method: Falsely claims delivery issues and requests updates to redirect packages.
• Exfil: Potentially collects tracking number and related details.
• Indicators: IP address as domain, non-matching URL.
• Risk: HIGH - Attempting to harvest package information for malicious purposes.
Pages with identical visual appearance (based on perceptual hash)