Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16C21E150040AB83F461752E4AAB7771635D98750C7570B0162F4D7FD1BD6D4CEE526A0 |
|
CONTENT
ssdeep
|
24:hRrspMPagSJGJPw8DTvhwpmXCWCJTub/I5aNLNSzn:TIpIAIN/vhMn1AcaN5Q |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9999b36666646666 |
|
VISUAL
aHash
|
183c181800000000 |
|
VISUAL
dHash
|
30b232320c100000 |
|
VISUAL
wHash
|
1c3c18180f0f0f0f |
|
VISUAL
colorHash
|
000000001c0 |
|
VISUAL
cropResistant
|
05e2809a9a80e201,d4cccd191370d8d0,82a2808c8e808201,30b232320c100000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 8 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain