Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1825171759097687711C7C2D5A17227CB77E2D20FC9A35A0492F9836BE7EDD80DC21126 |
|
CONTENT
ssdeep
|
48:Tgpyi4VnfzivhoRDEC0RfBX/74Dojfmx6f:T6VSfzivhoRwC+BX/Mo5f |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8f9e1c7174647159 |
|
VISUAL
aHash
|
033f3ff1b8200000 |
|
VISUAL
dHash
|
1779712b2b4b1732 |
|
VISUAL
wHash
|
9f3ffff5d0a80000 |
|
VISUAL
colorHash
|
31002440000 |
|
VISUAL
cropResistant
|
59c99a1b9794d955,1779712b2b4b1732 |
Fake Valorant site positioned to capture victims through SEO tactics, typosquatting, or paid advertising. Serves as entry point for multi-stage attacks including credential theft and malware distribution.
Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.