Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B98173768022EE27158B99E26671835F32D6EB0ADD6B0B062BFD93EC4FC5CD0CC86005 |
|
CONTENT
ssdeep
|
96:tdkcFJU9CQsftmWZaZAZ7u1ZnREV+FO8TA:YcFJp6eS84REh1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
af3e2e2a2a2e2e2a |
|
VISUAL
aHash
|
81ffbfffffffffff |
|
VISUAL
dHash
|
33446640c0c0c0c0 |
|
VISUAL
wHash
|
00203e3e7c7c7c7c |
|
VISUAL
colorHash
|
07000000007 |
|
VISUAL
cropResistant
|
33446640c0c0c0c0,aeeea7b337ccf4f0 |
• Threat: Brand Impersonation
• Target: WhatsApp users
• Method: Web page claiming business/social integration
• Exfil: JavaScript-based collection
• Indicators: High-risk domain age and naming mismatch
• Risk: High
The site lures users into scanning a QR code, which is likely a malicious WhatsApp Web link intended to link the victim's account to the attacker's device.
The site attempts to gain user trust by pretending to be a legitimate business tool.