Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17FC1D8BFA380032C0F1301E3EE5572AEA7B861CCE7148AD574C7D83866E4E964179A5D |
|
CONTENT
ssdeep
|
96:/zlsPmVlw/rmsrHmsdtmsXmsPmsbiI0dPjcPz2zHN+D8bYeQj/mhcCMuS+6GW5UT:/psPmjwTmsTmsdtmsXmsPmsbDUQ72zHP |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a92bd4273cd6c9c1 |
|
VISUAL
aHash
|
030139010103ffff |
|
VISUAL
dHash
|
3be3d36b6363309e |
|
VISUAL
wHash
|
db0179010103ffff |
|
VISUAL
colorHash
|
06007000000 |
|
VISUAL
cropResistant
|
3be3d36b6363309e,cb8480d4d48084c1,4032e0e826606062 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain