Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T186C2FA74A4A2AD3F0593C2F5A3309B4F72D1D38ACA774B1AA3F5939D1BC2D81DD52089 |
|
CONTENT
ssdeep
|
192:7b5FmYXbvDwlvdoHFkoeRKijzCmiX6nblcT1CMvLkSBbsVLgQFZ3BSp4X7xjlB:X5QsnqloBu1iqblK1jrsBgQrIp4VjlB |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d1f3d28c6c6ce4b0 |
|
VISUAL
aHash
|
ffed6c000042005a |
|
VISUAL
dHash
|
82899896d4d4d4d4 |
|
VISUAL
wHash
|
ffff4c00025e425e |
|
VISUAL
colorHash
|
18007200040 |
|
VISUAL
cropResistant
|
a384c4d2d293332c,82899896d4d4d4d4 |
Fake 全民钱包 site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.