Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T128135434A910647723279BC5B0A1CFCEB6D2A30ECB13D4A1F2F9639557C9EE18C1196B |
|
CONTENT
ssdeep
|
192:YZof4cLiDS7SVUDQwVig5xSovq8W0nFiEVphSY55C1C1CRSYi55C1C1C1CQmyv2y:YZfwSVczIoKgiPelYQYKoWM9Opc |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
943e363c243e3e3c |
|
VISUAL
aHash
|
007e5c5a7e7e7e7e |
|
VISUAL
dHash
|
b6f0b09696aaa2a2 |
|
VISUAL
wHash
|
007e7c427e7e407e |
|
VISUAL
colorHash
|
06007000000 |
|
VISUAL
cropResistant
|
b6f0b09696aaa2a2 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 66 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.