Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T146A14332B0585C3B1683C3956FA52B1E31E9E240CF524DA981F4EB5D9FE7CD5C89306A |
|
CONTENT
ssdeep
|
96:3duveBYh7PHbYh64jiLHH4t03ZSZQzLJyb0STED1dUNzmCLOhhc7:KvZP7YM4WLHY4SZQzlyxT4CLB7 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b389cc6699996666 |
|
VISUAL
aHash
|
e7ffffdbe7a5dbe7 |
|
VISUAL
dHash
|
08302a324c4d3008 |
|
VISUAL
wHash
|
f8f8fcfc03030303 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
08302a324c4d3008 |
• Threat: Credential harvesting phishing kit
• Target: Bitvavo cryptocurrency exchange users
• Method: Fake login form stealing email and password
• Exfil: Data sent to a PHP script (config/telegram1.php)
• Indicators: Mismatched domain, obfuscated JavaScript, unrelated TLD
• Risk: HIGH - Immediate credential theft
Pages with identical visual appearance (based on perceptual hash)