Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D7B1832FE29C5273162245D6B9EE12C5E35F001C4672CFDA4878819C37BAF209E766DB |
|
CONTENT
ssdeep
|
96:MtAo7IPgX7/wZlRR1t7XZIGAgPs1F123YziuKBe1OnCWDWcUch71Uw0xm2wcKb7Y:sGPM74r1t7XeTgE1FU3xg0HNhp1cG7Y |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bdd2906cc26c3ed2 |
|
VISUAL
aHash
|
ffffbfffff8181ff |
|
VISUAL
dHash
|
ac3b3b631b2b23c0 |
|
VISUAL
wHash
|
fe0b0999fb81811f |
|
VISUAL
colorHash
|
07200000600 |
|
VISUAL
cropResistant
|
ac3b3b631b2b23c0,139dcdcf98adad54,a9acd69ce28e2c8c,69ac9c8c9a4cd819,a0a78eae8c8c9a15 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain