Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T160A151FB92D0163A5B1702A6B00EA6DD9353603F7B05D8381CA480ED17F4D66A7731C7 |
|
CONTENT
ssdeep
|
96:q8TeiQ+Iyyk6hZ+H4lB78kOUkcuhz0mt+HX4UQPieNxOZQH+:q8y1/k6hZxB785cuV06+HXhSxOZy+ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b91b9160c3cd0d3f |
|
VISUAL
aHash
|
f98399e381c3c3c7 |
|
VISUAL
dHash
|
1b3b332b0f171e1e |
|
VISUAL
wHash
|
fb8399c181c3c3c7 |
|
VISUAL
colorHash
|
07000000680 |
|
VISUAL
cropResistant
|
1b3b332b0f171e1e |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain