Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T133413173B151192B02578BF5B149FFE5A2C79396DD2B7410F1BD51A723C9F02CD18948 |
|
CONTENT
ssdeep
|
24:hRxzeC4LaViATNSovV9JJ1Dl6sUEOfn95LSvQh9fnvRVIXil7J15VikRSZ986gV+:TxIISovbfQEQzBRVIi7kkA3RgHPJj5s |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
994027778dd8e731 |
|
VISUAL
aHash
|
000018181a0e9f3f |
|
VISUAL
dHash
|
944cb1b232783973 |
|
VISUAL
wHash
|
400018181fbfbfff |
|
VISUAL
colorHash
|
38000200098 |
|
VISUAL
cropResistant
|
944cb1b232783973 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 4 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.