Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B3C273B0A3809C5BA82BE949F685D7CC901E4149F7DA97D5F258CE8427DFCF78D006A2 |
|
CONTENT
ssdeep
|
768:7UzmHYjkYj/YjJg/74yhBX9cgp91j/XnBPgA0sWCyqcYglZhfrDDe5gOKKcA4wvr:4LHf |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9c16eb4929ee6631 |
|
VISUAL
aHash
|
001c06160affffff |
|
VISUAL
dHash
|
78782c7efa3c1636 |
|
VISUAL
wHash
|
001c06020affffff |
|
VISUAL
colorHash
|
0e002000180 |
|
VISUAL
cropResistant
|
78282c76fa2c1226,7978682cac6ef2fa |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 22 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain