Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DF334B736731B8AC82DB51EEEB382D4AB2C5549DECCB4440B5C9968D23C7C912287BB4 |
|
CONTENT
ssdeep
|
1536:a5+EsZ/8jQDVRrMjBSRBMjBDDrpRXPZlQaQD9OehM+BrUgq4z:aGTRBR0DrpR/PkEeDz |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9fd265c67165c431 |
|
VISUAL
aHash
|
bdbdbdbdbdbd8181 |
|
VISUAL
dHash
|
696979697969695f |
|
VISUAL
wHash
|
bd3d3d3d3d3d0100 |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
696979697969695f,cbb2f0608c70f2c2,ecf4f8fcf4e4fcbf |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 18 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain