Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14AD22F30A492AE3F40D3D2E996359B0F72E2C74ACA374B1AA7F5979E1FC2C45DE41049 |
|
CONTENT
ssdeep
|
384:k5sfoeH36Lf14oFvPVEzGhtkbDpT23pJbmr0mtfrm4KF+f:bX6Lf14gJtkbUZJ2m3Q |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b14638cfbc463993 |
|
VISUAL
aHash
|
00000070ffffffcf |
|
VISUAL
dHash
|
e6c8c8c54052391a |
|
VISUAL
wHash
|
00000030ffffffcf |
|
VISUAL
colorHash
|
16003000180 |
|
VISUAL
cropResistant
|
80c424a4d7d3d5e0,61616145968e8e9e,617552534021181a,18c6e488c8c8d866,718989a1c1c1b686 |
Fake Goubao Wallet (购宝钱包) site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.