Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T103C2E974A0A6BE7F1197C2F5A3309B4FB2D1D38ACA77470AA7F893991BC2C54CD51188 |
|
CONTENT
ssdeep
|
192:b0H5IqoUjgNKvDvdrnnlAovF9LgyfygRqDdqkh4IXKTWpPk08GWc7b:gH5IqoJNQlr+ov/lffGCOKKPTac7b |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d25210aced6d6d63 |
|
VISUAL
aHash
|
000000ffffffffff |
|
VISUAL
dHash
|
84c8c8d4002aabab |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f003400000 |
|
VISUAL
cropResistant
|
b2b1b2e4a6b72dcc,55452a2b94aa2b84,a886e488c8c8dcd6 |
Fake C币钱包 site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.