Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F9131233C0132132525B52E9F8A0775A2293C32EDE4708491B7CDB913BFBDAA798795D |
|
CONTENT
ssdeep
|
768:gjRH/CzpbjL13/r0C8J6a+co6v+c6o4IE/Irb5dEoGEqOzVWsPk6TRC1mX6nwCTS:gRHazdL13/z8J6fco6Gc6o4L/Irb5dE2 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e7151d1715559955 |
|
VISUAL
aHash
|
26e7efe7e7e7e7ff |
|
VISUAL
dHash
|
cc0d484d4d4c4d20 |
|
VISUAL
wHash
|
00a5e5a5a5e5a5bd |
|
VISUAL
colorHash
|
07000030000 |
|
VISUAL
cropResistant
|
cc0d484d4d4c4d20 |
• Threat: Credential harvesting phishing kit
• Target: Amazon users globally
• Method: Fake verification form stealing account credentials
• Exfil: Data sent via JavaScript form submission
• Indicators: Free hosting, obfuscated JavaScript, mismatched domain
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain