Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10B920C30A4A6BD3F4197D2E5A7309B0F72E2C34ACA774B1AA7F5939E1BD2D40CD50089 |
|
CONTENT
ssdeep
|
192:31Y5f6oEzPvDK36LfHVSmcwrsOUJLDBF26EW3baj1FD+N8DcMdFrysxwUf:3i5f6r/K36Lf1LcGsXJx4A34W8x/ybUf |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
931240adedec6d33 |
|
VISUAL
aHash
|
000000ffffffffff |
|
VISUAL
dHash
|
c6c8c87552520a0e |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f400080000 |
|
VISUAL
cropResistant
|
9b98f2d3d2f2e3cb,61515253240a0a06,ac86e48cc8c88886 |
Fake C币钱包 (C-Coin Wallet) page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.