Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T158F1CB5094C6B7BF05D392EBA7335FA937E08122D62A0E6516FDD74F0F86C46E813298 |
|
CONTENT
ssdeep
|
96:nLFDSv5PRcggjtid6RGjMkbizZVG98JfDiycYrBt2om+Z2ZW2unLu2d7J:JDSVRlg5Q6RGI4IGwrhXuoXwZQLuc7J |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec4d939292383dcd |
|
VISUAL
aHash
|
fff3c3d3f3c3c3e7 |
|
VISUAL
dHash
|
212336270616160c |
|
VISUAL
wHash
|
99f18191f381c3e7 |
|
VISUAL
colorHash
|
07200000007 |
|
VISUAL
cropResistant
|
212336270616160c,4c743c8cc3300963 |
• Threat: Cryptocurrency airdrop phishing scam
• Target: Flare blockchain users
• Method: Impersonating Flare to trick users into claiming a fake airdrop, potentially leading to wallet compromise.
• Exfil: Unknown, likely redirects to a phishing page or wallet connect request.
• Indicators: Domain mismatch, recently registered domain, 'Claim Airdrop' call to action.
• Risk: HIGH - Potential cryptocurrency theft and wallet compromise.
Pages with identical visual appearance (based on perceptual hash)