Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19023C672A1211833A17FA2D9F555F71591D3E70FCA829BE2A2F8A3760AC9C31FD13419 |
|
CONTENT
ssdeep
|
768:NnaXKh9aUlGXB1WoyLxOQF20W5mtby01FQ3lrvrvEG3ePPdvBRnDhMF9NpBxJ8m8:NnaXKzaU0XB1DyLxLF2j5mtzyjMYuXD5 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b03032cbcbc94dcf |
|
VISUAL
aHash
|
c7c7c3c7ffffffff |
|
VISUAL
dHash
|
9e2fae1e20381a2a |
|
VISUAL
wHash
|
008383c3dfcfc3cb |
|
VISUAL
colorHash
|
07400010040 |
|
VISUAL
cropResistant
|
9e2fae1e20381a2a,e9ecb6e2faf0f674,98c8a0f1f0b0b09c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 179 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 2 other scans for this domain