Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11F13EF3030A06A3B408BC2DA67309B5BF6D2829ADA77970973F5D78D4FD3C42CD1AA55 |
|
CONTENT
ssdeep
|
192:vvpurVxIpUr52Y7A+2+p5CGUwQcZ1qVxIpUR52Y7A+2+p5CGUTdv/QcZ1vxI7q4Z:vv6t6rXtcr/TY2uiA4Qb |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
be2f0718232b3c2f |
|
VISUAL
aHash
|
01ff83dbdf003c1c |
|
VISUAL
dHash
|
7b60333b3330607c |
|
VISUAL
wHash
|
01bf83cbff003c3c |
|
VISUAL
colorHash
|
07600018000 |
|
VISUAL
cropResistant
|
7b60333b3330607c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.
Found 2 other scans for this domain