Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18E33F9F993A8E6F5E501D3E8DB214575736B11FAAE82C720C3F8DF9C69A584DCC58880 |
|
CONTENT
ssdeep
|
768:BhXTRlXND9bVOvuOdIP3hyCBE8hXTRlXND9bVN:7RFVUuO2P3bRFVN |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bb26c4d9dbc092c6 |
|
VISUAL
aHash
|
ff0101090d0fffff |
|
VISUAL
dHash
|
b60f9d5b5919d2f8 |
|
VISUAL
wHash
|
7f0101010d0dffff |
|
VISUAL
colorHash
|
132000c0002 |
|
VISUAL
cropResistant
|
02b5014e0e071717,172d9b59191980d9,fcfdfbf2ccd840a0,170f2d1b5b591919 |
• Threat: Phishing
• Target: OpenSea Pro users
• Method: Impersonation via a fake landing page
• Exfil: Unknown (likely wallet info or seed phrase)
• Indicators: Free hosting, brand logo on a suspicious domain, obfuscated code
• Risk: High
The attackers are trying to impersonate OpenSea Pro by using their branding on a fake website hosted on Vercel. They likely intend to trick users into connecting their wallets or entering sensitive information.
The 'AIRDROP' text is likely used to entice users into interacting with the fake website.
Pages with identical visual appearance (based on perceptual hash)