Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1FEE20C3490A6BD3F5193D2E5A6309B0F72D2D34ACB774B1AA3F4A39E1BC2C50DD61099 |
|
CONTENT
ssdeep
|
384:oG5mi/732Iaf16GnNCiFvlwPE+lK1jSKhBRXm4tn3SA:P7GIaf1jCqvl4E+lK1jSKhbXmu3L |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b84738c7b8cd3c16 |
|
VISUAL
aHash
|
000000ffffffffcf |
|
VISUAL
dHash
|
c6cccc434765391a |
|
VISUAL
wHash
|
00000078ffffdf8f |
|
VISUAL
colorHash
|
0f401080000 |
|
VISUAL
cropResistant
|
906ca42854f6fb7b,184767631b20181a,b886c4c8c8cc9c82,718989a1c112b689 |
Fake KDPAY page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.