Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T154B2027094B5B63F009F7391A7386709A3D39783CB520BE567F8936D4B8AE84DC23169 |
|
CONTENT
ssdeep
|
192:bixLoxwz77qKHv/ySchJrVUmZGkozXTCReWyRMOsUFf9kIT/JO:mx8xw7pvKpJrVUIGkW+TxFUH/JO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bcc3c33c83693cc3 |
|
VISUAL
aHash
|
ffffffc3df8181ff |
|
VISUAL
dHash
|
39000027292b1342 |
|
VISUAL
wHash
|
8fffff8181818189 |
|
VISUAL
colorHash
|
07000000007 |
|
VISUAL
cropResistant
|
39000027292b1342,0000db6464649b24 |
• Threat: Package delivery scam attempting to gather information.
• Target: DPD customers.
• Method: Phishing page using DPD branding to trick users into believing their package delivery is delayed or has issues, prompting them to take action (likely to provide personal or financial information).
• Exfil: Unknown, likely a custom API to a malicious server controlled by the attackers.
• Indicators: IP address as domain, brand impersonation of DPD, potentially urgent language ('package returned to the warehouse').
• Risk: HIGH - Could lead to credential theft or financial loss if users interact with the page.
Pages with identical visual appearance (based on perceptual hash)