Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1EEC2ED30A5A2AD7F1087C2F5A7719B0F72E1C74ACA375B1AA7F5A39A1FC2C84CD41449 |
|
CONTENT
ssdeep
|
384:OW5odKCYI32Iaf1cttGhbwBjPVe4j5W8OQf:2KLIGIaf1cMbcVeYW8V |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
921212eded6d65e1 |
|
VISUAL
aHash
|
00000000ffffffff |
|
VISUAL
dHash
|
8cc88c94426751e8 |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0e0000006c0 |
|
VISUAL
cropResistant
|
22ace1c5f4fad2dc,19c367632b4155aa,9e8ccc88c88c9c20 |
Fake CGPay page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.