Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10D411E30614918380887C3CC72B5D38FA7B39344EB47059862E5E6906BDFFA8CD566C5 |
|
CONTENT
ssdeep
|
24:4OWCqy7sv5zKz3qwuhc0MNJhjENJhadFt+GnQ8+ac9xcjT3Cwsy3vKfbAd0f1DZ3:rP85zKz3oLirjaryt+GQ2vC0Ksy1DN15 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cfcfcc3431333131 |
|
VISUAL
aHash
|
30383c3800000018 |
|
VISUAL
dHash
|
6062584014000010 |
|
VISUAL
wHash
|
3c3c3c3c00003c3c |
|
VISUAL
colorHash
|
38000000000 |
|
VISUAL
cropResistant
|
6062584014000010 |
• Threat: Credential harvesting phishing kit
• Target: Trezor users internationally
• Method: Fake CAPTCHA page stealing user input
• Exfil: Data likely sent to attacker's server
• Indicators: Domain mimics Trezor, obfuscated JavaScript, form submission detected
• Risk: HIGH - Potential for credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain