Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1EFC20B34A0A6AD3F5097D2E5A3309B0F72D1D78ACA7B474A63F8939E1FC2C45DE61049 |
|
CONTENT
ssdeep
|
384:15X90NQGIdJfZJEqcEanjaB1f+oSp1Yyf:DyQFJZOq/anOB14ph |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d35214aeac6c6579 |
|
VISUAL
aHash
|
000000ffffff0000 |
|
VISUAL
dHash
|
c4c8d8d70c0082aa |
|
VISUAL
wHash
|
000000ffffffff00 |
|
VISUAL
colorHash
|
16006400000 |
|
VISUAL
cropResistant
|
cad2a4a4f6b08899,53410e0e06060400,ac8ec4c8c8c8dcd6,40a0b18a82d0eaa4 |
Fake TRON site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.