Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10B71C93590A2BA3F1153E2C9EB9167D4731582B8CE7B0F2649E18F1D5BD9837DC4218E |
|
CONTENT
ssdeep
|
96:hFnAbb4nHCDRMd4tBf5nHV6RQAR5XyxruxkA:hFnAbbwHsRaGBn6Qk5yxwd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b647591c594d3347 |
|
VISUAL
aHash
|
00ffe7ffffffffff |
|
VISUAL
dHash
|
304d4d968e96a496 |
|
VISUAL
wHash
|
0024e7c3c7c3dfc3 |
|
VISUAL
colorHash
|
06007000000 |
|
VISUAL
cropResistant
|
284d8e961e96a496,0000047171062000 |
Fake WhatsApp page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 5 techniques to evade detection by security scanners and make reverse engineering more difficult.