Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C371932FD187A7790D83137DFF7F01CCB341404691060A88B6BE810E9666AE5C56F9D7 |
|
CONTENT
ssdeep
|
96:T4Rtbix5JGgCd46DVkcISfY1feHriqmT9UsR:wFGGgr6DhgsrqSsR |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b04f4e4f466d5646 |
|
VISUAL
aHash
|
00ffffffffffffff |
|
VISUAL
dHash
|
f09e9e9e9c9c9e9e |
|
VISUAL
wHash
|
00cfc3c3c7c3c3c7 |
|
VISUAL
colorHash
|
07001c00000 |
|
VISUAL
cropResistant
|
989c9e9e9c9e9e9c,004016f0f00a1000 |
Fake Ledger page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.