Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BDF2D974A0A2AE7F4093D2E5A3349B0F72D2D38ACA77070AA7F9939D1FC2C45DD51189 |
|
CONTENT
ssdeep
|
384:v56hB732Iaf1DKSAovOvF22lThJ6VGEM7NA:Qb7GIaf1DpiFllT36Z |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d25210ecec6d6d1b |
|
VISUAL
aHash
|
000400ffffffffff |
|
VISUAL
dHash
|
84c898c743634d04 |
|
VISUAL
wHash
|
00000040ffbfffff |
|
VISUAL
colorHash
|
0f408008000 |
|
VISUAL
cropResistant
|
9a382c37138da6a2,1847636319400d0e,a886e4cdc8c89896 |
Fake Goubao Qianbao (purchased wallet/digital asset platform) login page with 2 forms. Victim enters credentials which are captured and transmitted to attacker's server. Page may impersonate Goubao Qianbao (purchased wallet/digital asset platform) official login to appear legitimate.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.