Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14DF29572A0201C37A1AFA2D9F515F30591E3EB0ECB825BE2A1F4A37609D9C71FD1751A |
|
CONTENT
ssdeep
|
768:cvgXW1K5rKW5lPpbyllPyrvrvEd3dA3vBRgdiEK:cvgXW1Ar95lPpRjMd+XSiEK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b03032c3cfcccdcd |
|
VISUAL
aHash
|
c7c7c3dfffffffff |
|
VISUAL
dHash
|
8e0f0e363a3a300e |
|
VISUAL
wHash
|
008783c3c3cfdfc3 |
|
VISUAL
colorHash
|
07007000040 |
|
VISUAL
cropResistant
|
8e0f0e363a3a300e,3803226365340a04 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 212 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain