Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F2032438580F106B1A23DCE1E121BF9F65A3EB3AC169C8A046ACD35C3FC7EF06559565 |
|
CONTENT
ssdeep
|
768:nfgwqZvzv4v5K/si/dF/ED/yv/PkichVhiwfC:fgqbif |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b364cccc33666ccc |
|
VISUAL
aHash
|
e3ffe7e7e7e7e7ff |
|
VISUAL
dHash
|
06004c4d4c4c0d0e |
|
VISUAL
wHash
|
c3c3e7e3e3c3c300 |
|
VISUAL
colorHash
|
07200010001 |
|
VISUAL
cropResistant
|
06004c4d4c4c0d0e,0862732616362616 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 78 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain