Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D9F1771FD30023640D92029DF91B93FEE72A0C98769246E8B5EC413DA290DD9C17BED7 |
|
CONTENT
ssdeep
|
96:TIXcXPr7FKjARaXQj6Zb9ymoL/K5nQqhegiFzC85pmHS+iNJ3hyk6rat4EoMvm0n:OmdKnn4TAnQqhHCzHmmVv6yffpmKujG |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e47399664e869563 |
|
VISUAL
aHash
|
e0e0e0e0e0f0f0f0 |
|
VISUAL
dHash
|
888a882000200020 |
|
VISUAL
wHash
|
f2e0f4c0f0f0f0f8 |
|
VISUAL
colorHash
|
38000000e00 |
|
VISUAL
cropResistant
|
888a882000200020 |
Fake Ledger page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.