Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T102D20B34A1A2AD3F50C3C2E5A6319B0F72D1C389CA774B4693F5A39E2FC6D91CD61189 |
|
CONTENT
ssdeep
|
384:z5cOsrqIdG+JP+4BZS4AKbYbaB1kr7HgP6n+i+KzR01K+7jf:KrZ7JPVDSkxB1I01jn |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b2523ec9adcd2d50 |
|
VISUAL
aHash
|
000000ffffffffbf |
|
VISUAL
dHash
|
c4cc8cd20806806d |
|
VISUAL
wHash
|
0000003cffffff87 |
|
VISUAL
colorHash
|
17002008040 |
|
VISUAL
cropResistant
|
d1d9d8a6a6fd6edd,514d0e0606c06c6f,9886e48dcdcd9c92,5af3d9dbdbd4ccc4 |
Fake K Dou Qianbao site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.