Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D2F2FE3E70463A5E543BC5C4F4A07F14BA77BBBAD1280E9A936496753FCACE06C21364 |
|
CONTENT
ssdeep
|
768:htt0ms9wRsgZ2R8LNYu9fefQ2Zq3xrrgWne0Ld70r0PCtTzhBeC3L:0WTZlZYu9fefQ2Zq3xrr7e0LdmTzhBeo |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9b8083bf333d3534 |
|
VISUAL
aHash
|
ffff000000000000 |
|
VISUAL
dHash
|
dbe9b60943434355 |
|
VISUAL
wHash
|
ffff42ff81818001 |
|
VISUAL
colorHash
|
30001000180 |
|
VISUAL
cropResistant
|
c3c3c3c3c2c0c2e2,dbe9b60943434355 |
• Threat: Credential harvesting phishing kit
• Target: Bitget users globally
• Method: Fake login form stealing email and password
• Exfil: Data sent via WebSocket (wss://wss.abazr.shop/wss)
• Indicators: Recent domain, obfuscated JavaScript, domain mismatch
• Risk: HIGH - Immediate credential theft