Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T195A1A5AF81C821591BD109E8355F32EAD28F421D7A53CF1474E00A6C23E6A877A727DE |
|
CONTENT
ssdeep
|
96:Lx7wP5x54/u5fB15fPt5fp5fJ5f/d5fvVXDZyLrrBwk7UZd0hR5Kl6Tt:uP/OG9L9Pt9p9J9195Z29nAr0hG6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
be1e314b70176c78 |
|
VISUAL
aHash
|
00bd1337f931ffcf |
|
VISUAL
dHash
|
4c71356c31634c1f |
|
VISUAL
wHash
|
003f01179b31ffc7 |
|
VISUAL
colorHash
|
071c0000000 |
|
VISUAL
cropResistant
|
4c71356c31634c1f |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain