Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T164B2017094B5B63F009F7391A7386709A3D39783CB520BE567F8836D5B8AE84DC23169 |
|
CONTENT
ssdeep
|
192:8ixLoxwz77qKHv/ySchJrVUmZGkouXTCReWyRMOsUFf9kIT/JO:xx8xw7pvKpJrVUIGkl+TxFUH/JO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e96b899c962666c3 |
|
VISUAL
aHash
|
f9e9e1f7ff81c3ff |
|
VISUAL
dHash
|
2b030327382b0342 |
|
VISUAL
wHash
|
a9a1e1c7878183fb |
|
VISUAL
colorHash
|
07000000006 |
|
VISUAL
cropResistant
|
2b030327382b0342,696969c9692b3734,337367e5cdcd8d1d,0000db6464649b24 |
• Threat: Package delivery scam phishing
• Target: DPD customers
• Method: Fake tracking page prompts for information or malware install
• Exfil: Likely to a server under the attacker's control
• Indicators: IP address domain, brand impersonation, prompts for information
• Risk: HIGH - Data theft or malware infection
Pages with identical visual appearance (based on perceptual hash)
Found 6 other scans for this domain