Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16FE2EB74A1A6BE7F5093D2E5A7309B4F72D1D38ACA77470AA3F8939E1BC2C41CD51089 |
|
CONTENT
ssdeep
|
384:J5x9TnQ36Lf1cUnbTkhv4jcSIiFRLPUJJ:L766Lf1cskhgjcS/tUD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f37246adcc6c25b0 |
|
VISUAL
aHash
|
00000000ffffffff |
|
VISUAL
dHash
|
86888c9140526d2b |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f000600180 |
|
VISUAL
cropResistant
|
44c2c025b3b76dd6,617152530155aa2b,1a87c288cd9c9823 |
• Threat: Cryptocurrency Wallet Phishing
• Target: OKX Wallet users
• Method: Brand impersonation and malicious redirects
• Exfil: Obfuscated JS exfiltration
• Indicators: Mismatched domain, obfuscated code, fake wallet portal
• Risk: Critical
Uses a fake restoration interface to prompt users for recovery phrases.
Promotes external suspicious links (AG6.ORG) to further engage victims.