Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13BF16422E14A371E096A026DEA51B7EDF3570298D2694FC8B17F823F7C840DA4573BD8 |
|
CONTENT
ssdeep
|
96:TmC9u0Jucpeg9z4xwxGMLnSpbRe/Ol7BNi1OAJ2FnfEmO+LCcCLhMR2HHyfQtFBs:z1quF6e0NhOxNeeSf0aGaJ/s6jd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8f68d29ef88595c1 |
|
VISUAL
aHash
|
0f0103030b3f3f2f |
|
VISUAL
dHash
|
b1d1cfc7776c68d8 |
|
VISUAL
wHash
|
1f01031f0b3f3f0f |
|
VISUAL
colorHash
|
07001008240 |
|
VISUAL
cropResistant
|
b1d1cfc7776c68d8 |
Fake Ledger page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.