Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T104F5B54066C06888234B8FFB772BB4E5F41E09AF795C488FE114BC2465A6627FEF5931 |
|
CONTENT
ssdeep
|
49152:7oW+0zU6TITSMbXUcBZBuJyPesVWvvg5MagjgM+J0bDyfXCixyR+qTXtityZBva2:NbDUCR |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8f850f852f852f95 |
|
VISUAL
aHash
|
7fffffffffffff00 |
|
VISUAL
dHash
|
d0c0000000410051 |
|
VISUAL
wHash
|
000000ffffffff00 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
d0c0000000410051,0100101010000001 |
• Threat: Credential harvesting phishing kit
• Target: Trust Wallet users internationally
• Method: Fake form requesting address/domain, amount, and memo
• Exfil: Data sent to Telegram bot (token: 8096816664:AAG3BsPLHaHwpn8qft-fRVy2JeGdlpAvnog)
• Indicators: Domain mismatch, obfuscated JavaScript, form submission
• Risk: HIGH - Immediate credential theft