Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19305733021145A6B129F8DF4B171BF6960FAD38DC61F8C99B7B887F15FCEC588A92241 |
|
CONTENT
ssdeep
|
3072:tzOUID67OzOUID67UzOUID67UzOUID67UzOUID67UzOUID67UzOUID67UzOUID6w:tqhqpqpqpqpqpqpqpqpqpqpqD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
94393dc7cbb0e892 |
|
VISUAL
aHash
|
ff0046667e766600 |
|
VISUAL
dHash
|
b246ac8ccceccc6c |
|
VISUAL
wHash
|
ff00466e7e767600 |
|
VISUAL
colorHash
|
30000600088 |
|
VISUAL
cropResistant
|
e8b239292b3bbb82,e1e0a0e0f4749ebe,d4d832fcfcd8f8fe,b246ac8ccceccc6c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 90 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain