Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11EF32CB43595F4930BB746A7806F0002F3385D3F140E5960A3A5ECDE766989EA0F3F9A |
|
CONTENT
ssdeep
|
1536:546/5TGtihLfa6Ih6hARs5Vx2t8qL2cJCSFeyCRFXmCk4vM9sPatObuur8EyWFvO:NhLfSQORgV86I4p8r |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9ecc6133339a9acc |
|
VISUAL
aHash
|
00003c3c3c3c0000 |
|
VISUAL
dHash
|
0016716969691608 |
|
VISUAL
wHash
|
30303c3c3c3c0000 |
|
VISUAL
colorHash
|
38001000003 |
|
VISUAL
cropResistant
|
0016716969691608 |
• Threat: Cryptocurrency phishing site
• Target: AVAX and Solana users
• Method: Fake comparison page to mislead users
• Exfil: Potential data exfiltration via WebSocket URLs
• Indicators: Recent domain, obfuscated JavaScript, unofficial domain
• Risk: HIGH - Potential for credential theft or malware distribution