Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C13255B11054976B8496FAD12B3CA76962809399CD374B03E3F5BB8D4EEEDC1FD06102 |
|
CONTENT
ssdeep
|
192:qgiQBuc7uEfNX3TYjlDVclBntSJdQYpln:Tis/fdDq6tSjQKn |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
acda14b5e1797903 |
|
VISUAL
aHash
|
3f3f11e3a3131313 |
|
VISUAL
dHash
|
f665610347666ee6 |
|
VISUAL
wHash
|
5f3f01e3a3131713 |
|
VISUAL
colorHash
|
31e00000080 |
|
VISUAL
cropResistant
|
f665610347666ee6 |
Fake bet365 site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)