Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F5D2D934A1A6AD7F5097C2E5A7319B4F72D1D28ACA7B470AA3F8D39D1FC2C40DE61049 |
|
CONTENT
ssdeep
|
384:u5TRn2riiQTSeTiz63wYb3B18vGe4jxiT:W4Q9KIB18vGeYgT |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d35262ecec6c6c92 |
|
VISUAL
aHash
|
00000000ffffffff |
|
VISUAL
dHash
|
96c988d60033218c |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f000600180 |
|
VISUAL
cropResistant
|
8a2787c9f4d6e070,4260323333000c0e,a886d0c9c9889c23 |
Fake JDPAY site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.