Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F3032538580F10AB1A63DCE1E121BF5F71A3EB3AC169C8A046ACD35C3FC7EB06659565 |
|
CONTENT
ssdeep
|
768:nfgwqZvzv4v5K/si/dF/ED/yv/PkhKWU5+C:fg55F |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b399cc6631666699 |
|
VISUAL
aHash
|
e3ffe7c7e7e3e7ff |
|
VISUAL
dHash
|
06084d5d5e4d0c2a |
|
VISUAL
wHash
|
c3c7c7c7c7c3c300 |
|
VISUAL
colorHash
|
07200038000 |
|
VISUAL
cropResistant
|
06084d5d5e4d0c2a,1333248c1d596a68 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 78 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 4 other scans for this domain