Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CE33736052335A6B02A383C1E6B69F9DD1C08350D3674A69F3FC876FAECEC44BD55262 |
|
CONTENT
ssdeep
|
768:F4gWt4ohY+lK02WOm0413MC0hsC63SQ4edF:Obt4ohY+lK02WOmK6iQ4edF |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bad74d2c119586d5 |
|
VISUAL
aHash
|
02a4fe4cc5818100 |
|
VISUAL
dHash
|
36494c9919252711 |
|
VISUAL
wHash
|
02f5fecfcd878101 |
|
VISUAL
colorHash
|
300000084c0 |
|
VISUAL
cropResistant
|
36494c9919252711 |
โข Threat: Phishing
โข Target: Crypto/Web3 users
โข Method: Impersonation of Web3 platform
โข Exfil: Potentially stealing credentials/wallet information through JavaScript.
โข Indicators: New domain, obfuscated JavaScript, and prompt to connect wallet.
โข Risk: High
The site likely attempts to steal login credentials, potentially for a crypto wallet or exchange, through a fake login page or by prompting to connect a wallet.
Malicious JavaScript code, possibly hidden in the obfuscated code, could be designed to drain the connected wallet of funds once connected.
Pages with identical visual appearance (based on perceptual hash)