Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19E92B724B352003E512B47D9BB20377E31D7E1DEC6A25509BB7C429133CACDAEEA52E5 |
|
CONTENT
ssdeep
|
192:6C0TyBGItJLcMLQg9l5hlV8/jf5hlF/jbiks0sF0O1Yz91:LYSfJLckHX5/yf5/1Y0O1e91 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c75115171757d307 |
|
VISUAL
aHash
|
00f1fcf033fff3ff |
|
VISUAL
dHash
|
c003a15555555565 |
|
VISUAL
wHash
|
00f0f0b002ff33ff |
|
VISUAL
colorHash
|
06403040000 |
|
VISUAL
cropResistant
|
8080c2d2c2800080,23a54555555555e5,83d4c0d4b348c833,67c83ff4ccd0e228,e767f12423865811,0993b3c3e1fb8741,b1d8dc3ccecbe8d8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 6 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain