Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D5F2FB70A0A6AD7F1093D2E5A7309B4FB2D1D389CA77570AA3F9A39E1FC2C45DD51088 |
|
CONTENT
ssdeep
|
384:W5rKG0R3r7jf1gjK69qBpXEpoRxf6hnfsWbfAL89lek4N1T:fRb7jf1gjKZBpXEKRxfQfs5k8T |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
917aeec56c6e9092 |
|
VISUAL
aHash
|
000000007e7effff |
|
VISUAL
dHash
|
c6c8c803d6d66908 |
|
VISUAL
wHash
|
004444007e7effff |
|
VISUAL
colorHash
|
1b003000180 |
|
VISUAL
cropResistant
|
3233b0d4d2c40e26,b292929236929392,8140510d160c0e06,a6c888d82686d6d6 |
Fake OKX (impersonated) site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.