Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T164D22E3090A6BA7F10D7C2E5A6319B4F72E1D349CA770B19A7F8A39E2FC2C54DD51089 |
|
CONTENT
ssdeep
|
384:D5IBgzJ/RoFQfZ8DGhtkbgvp/NOx++M+5b7k4HGh3:PZnZbtkbyN+PkmS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
925240eced6d6d33 |
|
VISUAL
aHash
|
000000ffffffffff |
|
VISUAL
dHash
|
c6c8c85608cccccc |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f0010001c0 |
|
VISUAL
cropResistant
|
2aba98a4b2b3acda,55cc8cccd0c8ccc0,b886e4c8c9c8ccc6 |
Fake APP钱包 (APP Qianbao) site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.