Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1673255B11064576F8597FAD16B2DA36E62C09799DD334B03E3F5A78D8AEEDC1BC01102 |
|
CONTENT
ssdeep
|
192:qkTVhyiQBuc7uEfNX3TwhCAQ31RQVnBntSJdQYpln:qk+is/fdDcVZtSjQKn |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
acda14b5e1797903 |
|
VISUAL
aHash
|
3f3f11e3a3131313 |
|
VISUAL
dHash
|
f665610347666ee6 |
|
VISUAL
wHash
|
5f3f01e3a3131713 |
|
VISUAL
colorHash
|
31e00000080 |
|
VISUAL
cropResistant
|
f665610347666ee6 |
Fake bet365 site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)