Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F3B1123031542ABB61C799F1B3A22B2E72E8C658CA27C649B3F5C35A6BDBC15CD40364 |
|
CONTENT
ssdeep
|
96:MTLCh/am/hVRt0UTM8////LQA0nJCPD9RJ4nsB:MTLC4mpVRt0UTHHbQZQD9RJ4nI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c3693c966dc79238 |
|
VISUAL
aHash
|
00202420007e7e00 |
|
VISUAL
dHash
|
a6c9c9c6f0e8e833 |
|
VISUAL
wHash
|
72747c70187e7e18 |
|
VISUAL
colorHash
|
31200030000 |
|
VISUAL
cropResistant
|
3866c7c7c7ce567c,8383abb1b18b0383,2b6b2b2b2b2b2b2b,a6c9c9c6f0e8e833 |
• Threat: Credential harvesting phishing kit
• Target: Blockchain.com users internationally
• Method: Fake giveaway page stealing email addresses
• Exfil: Data sent to unknown server (wheal.php)
• Indicators: Domain mismatch, obfuscated JavaScript, recent domain
• Risk: HIGH - Potential for mass email phishing
Pages with identical visual appearance (based on perceptual hash)