Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T184E1A627B61A723D0AE34289B6BC93CEB7154148D76707C526DDC33D2299F46EE319C1 |
|
CONTENT
ssdeep
|
96:TEkbwAAMxWwjLC45LZyaG1Ec99Bfvb5jfqTslvGQgcE9Uf44y5FqJKHvXUkdG2/R:jvTjmE/Q19Xqr/c1f4/u0HvTdG2/B0F8 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b04e6d394f644b1b |
|
VISUAL
aHash
|
00ffffffffc3c3ff |
|
VISUAL
dHash
|
601e9e9c909e969e |
|
VISUAL
wHash
|
00c3c7c7cfc3c3c3 |
|
VISUAL
colorHash
|
061c0000000 |
|
VISUAL
cropResistant
|
969e9c9c9896969e,00400e7171710220 |
Fake Ledger page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.