Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12C8201252140DC370677D2F581A19B0B52D2F641C9A3D719A2EBBB0B0ED2DF6DE92336 |
|
CONTENT
ssdeep
|
192:sgpu5cW2yu/iJaOnDIa/63yiQWDmLrMopdzuDcqfu8:jy52yu/iJa1rDQWqnMopdzu/m8 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f0070e7c83f1f907 |
|
VISUAL
aHash
|
0000efefcfcf0000 |
|
VISUAL
dHash
|
dfff9a189c18bbf6 |
|
VISUAL
wHash
|
0000efefefcf0307 |
|
VISUAL
colorHash
|
39206000000 |
|
VISUAL
cropResistant
|
09d22b1b1b8a1400,dfff9a189c18bbf6 |
Fake Padişahbet page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.