Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1AD512777F03868691360C0F9581170CCCA4E8E8EC1715EBA53D8888F5BDC7858DBD6D6 |
|
CONTENT
ssdeep
|
48:BtRBV4eTZTPU5yY+u/gGBlAYHG9tGTGh1GBm:BtpTPU5yY/4gltStS6gm |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bec9c13c30c13e3e |
|
VISUAL
aHash
|
ff9fbfff8383ffff |
|
VISUAL
dHash
|
fb3767c72e2f034c |
|
VISUAL
wHash
|
190303138383ffff |
|
VISUAL
colorHash
|
07201000600 |
|
VISUAL
cropResistant
|
fb3767c72e2f034c,929dcc8f98adac54,292c54dce04c4c4d,edac9c8c9accd839,24a7ceae8c8c5a55 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain