Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E1419425A1026A3B022756EAFAA0AF509163D34DCF0B5D18F7F291FA17E0C65D81A5DC |
|
CONTENT
ssdeep
|
24:hRxAgfC8zwsRE0w9RYFReh2aMHWsYSwJ3G9DZnij2XXl3hll3g8CmHFl7Xo9gKsN:TxAgG92iMySmGhZrxHFZd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ea57f02bc68313e8 |
|
VISUAL
aHash
|
e6d224341101c3c1 |
|
VISUAL
dHash
|
44366c69a54b9797 |
|
VISUAL
wHash
|
e6dafe3d110303c3 |
|
VISUAL
colorHash
|
38000e00000 |
|
VISUAL
cropResistant
|
a200198e8e6180a2,44366c69a54b9797 |
• Threat: Phishing
• Target: Ledger users
• Method: Impersonation via a fake website.
• Exfil: Unknown, likely to steal credentials and possibly cryptocurrency.
• Indicators: Free hosting, brand logo, JavaScript Obfuscation.
• Risk: HIGH
The phishing site attempts to steal user credentials by mimicking the legitimate Ledger website.
The site might attempt to lure users into downloading a malicious file after clicking the "Get started" button.
Pages with identical visual appearance (based on perceptual hash)