Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A9A1541B7208333106531276AB4A1BFDF326159CE267172465FFC1186F616AC83B39D6 |
|
CONTENT
ssdeep
|
96:TgIRC8uG/YQI/H1IBbV7AfvZ/NoG/ORePUwQQT0U:UuC8uXPGEHZKReaZU |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f84b4f595a494764 |
|
VISUAL
aHash
|
00dfffffdfffdfff |
|
VISUAL
dHash
|
1016161616161636 |
|
VISUAL
wHash
|
00c3c3cfc3cfc3c3 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
1016161616161636,0020c0c020808000 |
Fake Trezor page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.