Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17103EA7090A2AE7F5087C2E5A7309B4F72D1D34ACA77471AA7F9A39E1FC2C95CD51088 |
|
CONTENT
ssdeep
|
384:zC5VhOEAYg3r7jf1LUovAEkH0Cf3PfJiD4xjlA5A3fBfQsPgMp4ehnKyT:AH1gb7jf1LUE/cffJLwA9QsPgMpXnFT |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9032ba856f6dc1ba |
|
VISUAL
aHash
|
00040000007effff |
|
VISUAL
dHash
|
84cccc8696d6d600 |
|
VISUAL
wHash
|
004444007a7fffff |
|
VISUAL
colorHash
|
1b0000006c0 |
|
VISUAL
cropResistant
|
da4e3ef6f29dcd66,b2929292369292b2,044050c061610432,86cccc8c2286d6d6 |
Fake KDPAY site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.