Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14CB1FB23A35C33370B81817A77A50389D6DF601D7391478C21B421FD27EDE684A726F6 |
|
CONTENT
ssdeep
|
96:hrAjBPy47k/oV+5VqtV6ViVY7Aj+B/112PmMWrFGRkHDJW2MZC5pKcegE:FAjBPpggVoVqtV6ViV8AjW1s2URW6EpW |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
be8dc1993ec1c127 |
|
VISUAL
aHash
|
ff9fff8383ffe7e7 |
|
VISUAL
dHash
|
3377462e2f820e8e |
|
VISUAL
wHash
|
1b03338383ffc3c3 |
|
VISUAL
colorHash
|
07001000600 |
|
VISUAL
cropResistant
|
3377462e2f820e8e,83989caeae989c6c,039bd89c8c985661,ada7868e9a998b16,829c8c8c8c3cdc5b |
⢠Threat: Phishing
⢠Target: KuCoin users
⢠Method: Impersonation via a fake login page on free hosting.
⢠Exfil: Likely steals login credentials.
⢠Indicators: Free hosting, brand logo, obfuscation.
⢠Risk: High
The attackers create a fake login page that mirrors the legitimate KuCoin login. When a user enters their credentials, the information is sent directly to the attackers.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain