Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17273C633D3121103906B98C8F1264B8A73628759DA138FB577FC1779E9CECB53A62399 |
|
CONTENT
ssdeep
|
1536:q1wpeAt3eS132Efz4l0bVeDSA5mAT+0q0JpFRpVudHKMVCxk222I2222222YjgjB:F9mEcffJzRPYqxk222I22222226iF386 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e136cd64399bc346 |
|
VISUAL
aHash
|
22837ecd40e17cf9 |
|
VISUAL
dHash
|
d626c89b8b8bfadb |
|
VISUAL
wHash
|
32837ec340c17cfb |
|
VISUAL
colorHash
|
06200030000 |
|
VISUAL
cropResistant
|
d626c89b8b8bfadb,099964f1312f2b2b,4b4b3198d8d08c4d,36929b4bd31a2b2b,256d4f7747596b21 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 20 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain