Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D891627A4012ED7B48C3D2E196B9474F72C4DB16DD230B2A67F5A7AC4FC6D88CDA0214 |
|
CONTENT
ssdeep
|
96:iVxPWru/jBYH+YZmKQdMlOgB3L1CcaeEeYd:i3PWr4jnoPff71qeYd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ab3f3b2a2a2a2e2a |
|
VISUAL
aHash
|
01ffbfffffffffff |
|
VISUAL
dHash
|
0b5860c8c4c4c0c0 |
|
VISUAL
wHash
|
00203e3e707c7c7c |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
0b5860c8c4c4c0c0,f769282c282c24df,ffb6e6aeff4f4f4f |
Fake WhatsApp page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.