Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16FE2EB74A1A6BE7F5093D2E5A7309B4F72D1D38ACA77470AA3F8939E1BC2C41CD51089 |
|
CONTENT
ssdeep
|
384:J5x9TnQ36Lf1cUnbTkhv4jcSIiFRLPUJJ:L766Lf1cskhgjcS/tUD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f37246adcc6c25b0 |
|
VISUAL
aHash
|
00000000ffffffff |
|
VISUAL
dHash
|
86888c9140526d2b |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f000600180 |
|
VISUAL
cropResistant
|
44c2c025b3b76dd6,617152530155aa2b,1a87c288cd9c9823 |
• Ameaça: Phishing de carteira de criptomoedas
• Alvo: Usuários da OKX
• Método: Representação de marca e redirecionamentos maliciosos
• Exfil: Exfiltração via JS ofuscado
• Indicadores: Domínio incompatível, código ofuscado, portal de carteira falso
• Risco: Crítico
Uses a fake restoration interface to prompt users for recovery phrases.
Promotes external suspicious links (AG6.ORG) to further engage victims.