Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1AE135B726332B87843DB92EEE7382946B2D6589DF8C74410F5C99ACD23C3C816197BB4 |
|
CONTENT
ssdeep
|
768:al+EsZx8/G8B4ODaw5MABDwsMABl3Ucix+y9dQpUDF1E56ITmHkLcZI2jPqDvBAv:al+EsZ/8yODaw5MABDwsMABl3UXx+y99 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bf3fc0c03d5dc0c2 |
|
VISUAL
aHash
|
8181818187ffffff |
|
VISUAL
dHash
|
7f7971737d332f23 |
|
VISUAL
wHash
|
8101018181ffffff |
|
VISUAL
colorHash
|
06000e00000 |
|
VISUAL
cropResistant
|
7f7971737d332f23,4a97bba2bb23edfd,f480c02aaa80a0f4,fffff9f9edf3f3ef |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 17 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 4 other scans for this domain