Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C4F1755A928932810ACA03667F53D3DED31D444CDB3943D5E9EED21F64C69C8C8AB4CD |
|
CONTENT
ssdeep
|
96:JdCJgDyulbIAqdiQ8ebYk4Pvo1wxGGyNup/BIYV224lA0aWoO1rQyEZwxfghZQJ+:JzLlUrRtN6yVh+ykqU |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b06664cdcd339666 |
|
VISUAL
aHash
|
c3c3c7cfcfcfc7c3 |
|
VISUAL
dHash
|
96969c9c9c989e96 |
|
VISUAL
wHash
|
c0c0c0c0c0ccc0c0 |
|
VISUAL
colorHash
|
07e00000080 |
|
VISUAL
cropResistant
|
96969c9c9c989e96 |
Fake Ledger site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.