Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BAC22B3464A6BD3F1097C2F5A3709B4FB2E1C249CA375B09A7F2A3A92FC2C59DD11449 |
|
CONTENT
ssdeep
|
384:nd5d46pJ76nzNEsRnqWKFgTKTKv3T9INNesu+LEVY:nJBpJWSsRqW3UuWLEm |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c240448fed6d79b3 |
|
VISUAL
aHash
|
00000000ffffffff |
|
VISUAL
dHash
|
c6cc8cd6002baa2b |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f003000180 |
|
VISUAL
cropResistant
|
51492b2b942a2b2b,18c6e48cc88cd662 |
Fake K-Bean Wallet (K豆钱包) page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.