Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T157F2DB70A0A6AE7F10D7C2E5A7319B4F72D1D34ACA67071A97F8A35E2FC2C94CD51188 |
|
CONTENT
ssdeep
|
384:O5doNYu3r7jf14tbESTI/FO5A3oBHGVDLqe4TipR:rqub7jf14tIWA+GdqeMiP |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9032bac56d6dc53a |
|
VISUAL
aHash
|
00040400007effff |
|
VISUAL
dHash
|
8cc88c8696d6d400 |
|
VISUAL
wHash
|
004c44006a7fffff |
|
VISUAL
colorHash
|
1b0000006c0 |
|
VISUAL
cropResistant
|
f6b6ae2652d0d6ce,b2929292369292b2,8542554592c8ccc8,86c8889c2286d6d6 |
Fake 808 Wallet (808钱包) page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.