Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DDD2CB74A0A2AD7F5097C2E5A7319B4F72D1D38ACA770B1AA3F8939E1FC2C41DD51089 |
|
CONTENT
ssdeep
|
384:k5HKnB32Iaf19lMZIDkKAlK1jrsBgQr005T:nBGIaf19oKAlK1jrSgQr0uT |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f25230cdcd6d29b2 |
|
VISUAL
aHash
|
00000000ffffffff |
|
VISUAL
dHash
|
868d8c9240650b0a |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f0004000c0 |
|
VISUAL
cropResistant
|
cf7d09a6a6c96966,19436767112f0a06,0c86e48dcd8d9a21 |
Fake K豆钱包 site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.