Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16122DE70806515FBA20B8EE0F5316B6EB9DE934DCA075D4463FC1BD2EBCDC90C824A54 |
|
CONTENT
ssdeep
|
192:JqyCYddTDOV+r/6H/61/i///6r/68/6M/Ah:J9CKJDq+r/6H/61/i///6r/68/6M/Ah |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ba1f539544c55273 |
|
VISUAL
aHash
|
008181ff81ffffe5 |
|
VISUAL
dHash
|
79793923151dd955 |
|
VISUAL
wHash
|
0081819d85efffe5 |
|
VISUAL
colorHash
|
0f202048000 |
|
VISUAL
cropResistant
|
c2c282c2c2c2c2c2,79793b231d1d5955,baf2e4e9cdc5c4c7,c03d397d7d39392b,1b53d57db97d7d7f,0010060ec4676767,4e9398253b67360f,e0e0e0e070f0f0f8,898f456d0f8f4e4f,0b3135371f1f4347 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 8 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain