Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T139518622961432B106E30181FBB2827EC719859CB3929F5C1B9C4119A3CA75DCBBEED2 |
|
CONTENT
ssdeep
|
48:TuMzrdF+PfzUXDz5iiVcm3G7ed4FKXF9Q71MNf4Moh:TuMzr/wwXZiiicG7A0EDf4Moh |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bc7c4b524359b86c |
|
VISUAL
aHash
|
00ffffffffff0000 |
|
VISUAL
dHash
|
2c24361c26307012 |
|
VISUAL
wHash
|
00df93ffff8f0000 |
|
VISUAL
colorHash
|
0e000000000 |
|
VISUAL
cropResistant
|
2c3636126c26347c,0000000000000000,80002020c02020c0,00224c32320c1000 |
Fake 4e Exchange site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.