Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14DC2FB34A0A6BA7F0597C2F4A3309B8FB2D1D38ACA77471AA7F4939D1BC2C45DE51049 |
|
CONTENT
ssdeep
|
192:N58xShcNKvDCBQGfZSoQRz5VcTvJNmviGmu+o4VltSLyZT:N58whcNQCBVfZSoiovaqGmhPpZT |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d35210ecec6d6d32 |
|
VISUAL
aHash
|
000000ffffffffff |
|
VISUAL
dHash
|
c6c8d8d600cec8cc |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f003400000 |
|
VISUAL
cropResistant
|
80c424a4d5d3d5e0,61616145948e8e96,55cc88ccd0c8ccc4,b886c0c8c8c9d8d6 |
Fake 998PAY site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.