Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17243BD20F27274579133ACD0B9D15F297696C72BC3055A4DE3B92906EECFCE46CA0399 |
|
CONTENT
ssdeep
|
1536:5yC3C5jY8FiJ5HOyXHxa7gInbyRnacLf6eLfqsLf4BLfMcTzhBeC3D:Oyi |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d4d0392f2bced0e4 |
|
VISUAL
aHash
|
003efe3c50003003 |
|
VISUAL
dHash
|
19f8f461a2646616 |
|
VISUAL
wHash
|
0c3efebcf000339b |
|
VISUAL
colorHash
|
30012008040 |
|
VISUAL
cropResistant
|
dcb66a61616af4f8,fc62934ab8d27634,ffffffefefefffff,8200080808080882,19f8f461a2646616,cd0e26733530b38f |
• Threat: Cryptocurrency phishing site
• Target: Bitget users globally
• Method: Fake trading platform stealing login credentials
• Exfil: Data sent via obfuscated JavaScript
• Indicators: Domain mismatch, recent domain, obfuscated JS
• Risk: HIGH - Immediate credential theft