Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T172030E3091A6AE3F5097C2E5A2719B4F72E1D355CA374B19A7F8A3AE2FC2C55CD41088 |
|
CONTENT
ssdeep
|
384:kt58IggJ/aoFbsquQqeyHIdRNDylGhtkbeBQ6KngTFja+LfwIWuf:eS2htkbWL0+cIJ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
921210eded6d6d33 |
|
VISUAL
aHash
|
000000ffffffffff |
|
VISUAL
dHash
|
e4cdcd5208282b2b |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f001000180 |
|
VISUAL
cropResistant
|
3a9ee6e6b2bc3498,51682b29942b2bd4,b886e48ccdcdccc2 |
Fake NO钱包 page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.