Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T134E2FB30A0A6B97F1183C2E5A7319B4FB2D1D34ACB675709A7F5A39E2FC2C94CD51089 |
|
CONTENT
ssdeep
|
384:45xt6rY7nAqPgdkpZz9YWvwcT0Bkqik4xQ5:HcTAApZz9LvwcgikGQ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
921216eded6d60b3 |
|
VISUAL
aHash
|
00000000ffffffff |
|
VISUAL
dHash
|
c6c88cd4008ec8cc |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0e0000006c0 |
|
VISUAL
cropResistant
|
ced9c9c4b6924322,454488ccc4c8cccc,9e8ee888c88c9c20 |
Fake OKPAY page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.