Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19B921B34A4A6AD3B00D7C2F5A631AB0F72E1C349CA7B5B1AA7F5A3991FC5C45CE1014D |
|
CONTENT
ssdeep
|
384:H5nvsrbMzspHkXz9cSIiFr2Ge3ImYN+KzRx57gT:CrgziHaZcSVx5cT |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e35044adaded6d18 |
|
VISUAL
aHash
|
000000ffffffffff |
|
VISUAL
dHash
|
c6cccc8e080e0a0e |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
17006200200 |
|
VISUAL
cropResistant
|
70706026b3a5ace8,2a0a06060a0a060e,ae86c6ccc9ec9692 |
Fake KDPAY site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.