Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11E55037AEC0D5A09707675CDE3DC0D8FE995F357E32218E696C5DF31818A818B82A87C |
|
CONTENT
ssdeep
|
1536:sRnof9NAQXhNC8eqkfWKwPFwqGutEqshNC8eqkfWKwFPw+cutEQiJnP6RrkS0/dR:/fkQXhNSPGEqshNSBGEDhNS5GE+AXS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bf601e4a5a1f116b |
|
VISUAL
aHash
|
00e3c3e7f9ff819f |
|
VISUAL
dHash
|
690f8e8fc3736b6b |
|
VISUAL
wHash
|
00c3c3e3e9bd819f |
|
VISUAL
colorHash
|
06000600088 |
|
VISUAL
cropResistant
|
690f8e8fcb736b6b,cecc51a1a969b2b2,b2b775b4d4c6b2f2,0669496979694906,82cc9494acec8c92,3291c8c0e4c4c0d8,c6cacd7737cacb0b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 49 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.