Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C5F1BE5084C6B7BF05D392EAE7335FA977E08122D62A0F151AFD974F0F86C46E813299 |
|
CONTENT
ssdeep
|
96:nLFDSv5PRcggjtid6RG290LEw4W+8r0Fb84q0L0Pj10/ZtIFqHIM7unLu2d7J:JDSVRlg5Q6RGrKWsF3pu18ZeGCLuc7J |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ed4d939292382dcd |
|
VISUAL
aHash
|
fff3c3d3f3c3c3e7 |
|
VISUAL
dHash
|
212336270616160c |
|
VISUAL
wHash
|
99f18191f381c3e7 |
|
VISUAL
colorHash
|
07200000007 |
|
VISUAL
cropResistant
|
212336270616160c,4c743c8cc3300963 |
• Threat: Airdrop phishing scam using brand impersonation.
• Target: Users interested in Flare cryptocurrency.
• Method: Luring users to a fake website to claim an airdrop, potentially stealing credentials or cryptocurrency.
• Exfil: Likely designed to steal cryptocurrency wallet information or direct users to malicious downloads.
• Indicators: Domain does not match the official Flare website, new domain registration.
• Risk: HIGH - Potential for significant financial loss if users interact with the scam.
Pages with identical visual appearance (based on perceptual hash)