Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B2E2DA74A0A6AD7F5497D2E5A3309B4F72D2D38ACA774B0A67F8939E1FC2C40CD51089 |
|
CONTENT
ssdeep
|
384:r53RAnd3r7jf1Sr5yceb0wOP64Ese4e97s:f6db7jf1SrEhzOPVEse59Q |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c17aee852c6e81b3 |
|
VISUAL
aHash
|
000000007e7effff |
|
VISUAL
dHash
|
868c9803d6d64d00 |
|
VISUAL
wHash
|
404440007e7effff |
|
VISUAL
colorHash
|
1b000400180 |
|
VISUAL
cropResistant
|
b292929236929392,a4425585822aaa2b,8684889e2286d6d6 |
Fake NO钱包 site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.