Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D2C30B287642103B2977D6C0ED64BF2A61D3F30FCA594854AAFC43741FDBE7278A9864 |
|
CONTENT
ssdeep
|
1536:wfOKabXFMgpNLqnF+Z0tNSejY1D2k4uoZNT1isAUFmgFIcVSIiH8q4NFmPybb64i:wRmLqF5v3E2klgtMHTO5kTvO84BsDcvY |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f7c3cb3c3a381c30 |
|
VISUAL
aHash
|
fffef896869682ae |
|
VISUAL
dHash
|
51c254642c242c58 |
|
VISUAL
wHash
|
edf8dcb4869084bc |
|
VISUAL
colorHash
|
0e010000200 |
|
VISUAL
cropResistant
|
51c254642c242c58 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1357 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain