Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T196B19833A3082765028182D4E65972FFC25B90ACC7110EE5F59DD72DAC98DC985B3BE6 |
|
CONTENT
ssdeep
|
96:JEW1TrzMI8iOGbmbWR2WU7f1QduHOY9Mq3m:JdTfn88bGWIWUT9l3m |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ad8dd21636661d2d |
|
VISUAL
aHash
|
bffb99838383e7e7 |
|
VISUAL
dHash
|
7573333737338e8e |
|
VISUAL
wHash
|
9ffb81818183c3e7 |
|
VISUAL
colorHash
|
07000000c00 |
|
VISUAL
cropResistant
|
7573333737338e8e |
Fake Trezor site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.