Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13DB15274818C9A37019792C9A7634F0B73C5C205CE9B6B0653FB83ED9FDAC85DC1925A |
|
CONTENT
ssdeep
|
96:4KKO0548a5o4Vrs4bvLARCni2200Er0P2yi4ha1G9dvaL4:4KbzzVrNbvLAKi2d01P2Z4w1GLvS4 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ac0a9bb187cec6b8 |
|
VISUAL
aHash
|
ff000000c3c3dbff |
|
VISUAL
dHash
|
f071716d96969696 |
|
VISUAL
wHash
|
ff000000c3c3ffff |
|
VISUAL
colorHash
|
03000000180 |
|
VISUAL
cropResistant
|
2000c08036717172,71716d969696968e,2e39bbbae4c2e369,717131697171696d,4d9292cdb6c8924d,4d92b24cb2cc924c,020a070707030a00 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 65 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain