Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CB52307470180ABF0A2B86D87460EB9EF1C6E34CC96BC55593FC42661FCBDA6DC82871 |
|
CONTENT
ssdeep
|
192:0nPOIY1KrQ0eQTnz7UXR6h9bjBOfpY/zOXEnIpO:iOTKzPTnz4XR6fBOhY/zOXEV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83b469c97216adab |
|
VISUAL
aHash
|
0f1f1f2e7c783820 |
|
VISUAL
dHash
|
fefefeccc8f2e0c8 |
|
VISUAL
wHash
|
0f1f1f2e7e783820 |
|
VISUAL
colorHash
|
000020001c0 |
|
VISUAL
cropResistant
|
fefefcc8d8e0c090,fffffffbf3fcf9e3,d83060c888206061,ff454d51514d45ff,7f4750484848407f,7c004c2031380420 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 16 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.