Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10CB16231A465AD3712D3D2E97BF20B0EF2D2C25AC7AB2A0156F983DC4FD2E55DD06086 |
|
CONTENT
ssdeep
|
96:xD6fx49h9SGRnTruYfmWtMEkIgiLt6jRC2k/kMkoXyw:s+9h9IstdJ47PMkoXL |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
eced4316961233e5 |
|
VISUAL
aHash
|
ffffffffff000000 |
|
VISUAL
dHash
|
381212362632d0d4 |
|
VISUAL
wHash
|
fffbc3d3ff000000 |
|
VISUAL
colorHash
|
060020001c0 |
|
VISUAL
cropResistant
|
203c12121d372642,0c3232304aa4940a,920892b296968292,143032c4d4d4d4c0 |
• Threat: Brand impersonation phishing
• Target: imToken wallet users
• Method: Displaying a fake imToken landing page to deceive users
• Exfil: None visible in screenshot (likely redirects to phishing site for credential harvesting)
• Indicators: Domain imken.vip (suspicious), recent domain registration, brand impersonation
• Risk: HIGH - Potential redirection to a credential harvesting site
Pages with identical visual appearance (based on perceptual hash)