Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18AD1B717929673580A06032D7A67A3FEE62540C5F2390A94F5F8811F62E5BC6C53BDCB |
|
CONTENT
ssdeep
|
96:TNRwXmmQ0ck/WW0OXXPURsFPFMg4/Q7EPPZW3XrtTbGosUb7yaXaBhlqRpbu2:BULEk/Wa8RaFyPhwtb519S4RpN |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9b645019a63b6e6e |
|
VISUAL
aHash
|
003c003f3d1d1d3f |
|
VISUAL
dHash
|
8cb033e8f579f9ed |
|
VISUAL
wHash
|
007e003f1d1f1f3f |
|
VISUAL
colorHash
|
000060000c0 |
|
VISUAL
cropResistant
|
a2a4d22d2d4c90a2,8cb033e8f579f9ed |
Fake Ledger site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.