Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11EC2EC30A492AD3F4187D2F5A7349B0F72D2C74ACA771B4AA7F5A79E1BC2C81CD51089 |
|
CONTENT
ssdeep
|
384:ee54dW/z3r7jf1kimtumi84vs1JGyVwxZP7uf:eNqzb7jf1zmYm14vByKZi |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9032fec56d6f4191 |
|
VISUAL
aHash
|
000400007e7effff |
|
VISUAL
dHash
|
c4ccc802d6d66d04 |
|
VISUAL
wHash
|
100404007e7fffff |
|
VISUAL
colorHash
|
1e4000c0000 |
|
VISUAL
cropResistant
|
74f69abea6e6c9a1,b2929292369292b2,0851410e16060616,a6ccccc82696d4d6 |
Fake VIVO site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.