Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T107E20A30A492AD7F0497C2E9A6309B0FB2D1D349CA375B0697F5A39E2FD2C95CD5018D |
|
CONTENT
ssdeep
|
384:k5L9s0shkYuKJvPEavGavWLcs+JD5F3tD0mY/k4LN7/T:Nl1JnEwvWLcUkcNzT |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3401fccbd4c3bc2 |
|
VISUAL
aHash
|
00000060ffffffff |
|
VISUAL
dHash
|
c6ccccd200060459 |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
17003000180 |
|
VISUAL
cropResistant
|
74b3b365e074b4b0,41550606161cc15b,1cc6c4ccc8ccdc62,717970b4b2b2e0e0 |
• Amenaza: Phishing de billetera de criptomonedas
• Objetivo: Usuarios de EE Wallet
• Método: Landing page maliciosa con scripts ofuscados
• Exfil: Posible drenador de billetera o robo de credenciales
• Indicadores: JS ofuscado, promoción cruzada sospechosa
• Riesgo: Crítico
The site attempts to prompt users to 'connect' their cryptocurrency wallets to exfiltrate private keys or permissions.
Uses encoded strings to hide malicious redirect and phishing logic from scanners.