Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11753427451015B7A264383D4A630C95BF39AF6A3DB17868C53EC425B3ACBCC4CEAE9D4 |
|
CONTENT
ssdeep
|
1536:7ldrGrIqSRBu6h/8Gi+20hFlPSBjh434c/8l9D5NQY8kyj:7Grys6x8Gi+vrqBjFT8h |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
92b2e969d29a82bd |
|
VISUAL
aHash
|
ff003f3f0c00183c |
|
VISUAL
dHash
|
f107fcfdfcd8f0d5 |
|
VISUAL
wHash
|
ff033f3f1e00183c |
|
VISUAL
colorHash
|
30000030000 |
|
VISUAL
cropResistant
|
f0f0f2dac8daf2f0,211efdfdf8d0f0d5 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 123402 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.