Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E82267B61054576B8566FAD12B3DA72E62C08399CD374B03E3F5A78D4EEEEC2BD05101 |
|
CONTENT
ssdeep
|
192:9I9iQBuc7uEfNX3TUyoUcQGCDQBntSJdQYpln:Cis/fdDA7CMtSjQKn |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
acda14b5e1797903 |
|
VISUAL
aHash
|
3f3f11e3a3131313 |
|
VISUAL
dHash
|
f665610347666ee6 |
|
VISUAL
wHash
|
5f3f01e3a3131713 |
|
VISUAL
colorHash
|
31e00000080 |
|
VISUAL
cropResistant
|
f665610347666ee6 |
Fake Bet365 page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 1 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)