Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T189B1CBB0A082FA3702C7D3D5DE361B5E72D98294DA839B0453F18B885FCAF69DE22451 |
|
CONTENT
ssdeep
|
96:T69XJMi0ucg5MMXKwfethFDbeTYinVV9i6rXdSTaL/r/r/r/9RKB:W95MinDuyL/r/r/r/9RKB |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec4d176d0f930ac9 |
|
VISUAL
aHash
|
00f0f1fff350ff7f |
|
VISUAL
dHash
|
62969581379596e5 |
|
VISUAL
wHash
|
00f0f0ffd340f713 |
|
VISUAL
colorHash
|
06202048000 |
|
VISUAL
cropResistant
|
8282e2eaeae28082,969585b737d496e5,72e3967683959545,236edc634b87e763,74783c160b854761,616c6e5e1e5e7e7c,868283850c8d0c6d,7d796b730b736367 |
Fake Amazon page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.