Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13EE2FC3090A2AA3F4093D2E5A3719B0F72E1D349CB374B1AA3F9939E1FC2C55DD52089 |
|
CONTENT
ssdeep
|
384:e35sXRV3r7jf1SoF4sqOjFuqwyeHArz9Ovhtkb5m4hGginff:e6hVb7jf1SUrz9Ytkb5m4hGgi3 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c16aee852f6a81ba |
|
VISUAL
aHash
|
000000007e7effff |
|
VISUAL
dHash
|
c6cccc03d6d64900 |
|
VISUAL
wHash
|
600440007e7effff |
|
VISUAL
colorHash
|
1b600050000 |
|
VISUAL
cropResistant
|
b292929236929392,a54255a4c8ccccc8,86c4cccc2286d6d6 |
Fake K-Dou Wallet (K豆钱包) page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.