Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T188032E7090A6BD7F1093C2E5A3359B0F72D1C38ACA671B19A7F5A3AE2FC2C54DD51089 |
|
CONTENT
ssdeep
|
768:RDsb7jf13ZdwEZAxYtLgllK1jWKhs3IpuY:RDsP0ojLs3Ip3 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9032bac56f6cc52e |
|
VISUAL
aHash
|
00040000007effff |
|
VISUAL
dHash
|
8cc8cc8696d6d400 |
|
VISUAL
wHash
|
004c44006a7fffff |
|
VISUAL
colorHash
|
1b0000006c0 |
|
VISUAL
cropResistant
|
d213b5b6341a1236,b2929292369292b2,8442514596aa2bab,a6c8c89c2286d6d6 |
Fake 988钱包 page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.