Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16A53637292102837617B79DAF164771AD2D3D74FCA8346E1A2F8939A0FD6CA1EC5340E |
|
CONTENT
ssdeep
|
1536:1zvXWn4rzDoeLLsgZtgTbgPNg57g8ngjLgLTnggdgweg7ig8ggNOg84gIMgfgW1Y:RvXWGDjI+KHCOTHrLoncK9N00F/ox/ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b4cb36499a96cd34 |
|
VISUAL
aHash
|
0000dfffc3f3c3c3 |
|
VISUAL
dHash
|
e8e8363006160e0e |
|
VISUAL
wHash
|
0000dfffc3c3c3c7 |
|
VISUAL
colorHash
|
07001001040 |
|
VISUAL
cropResistant
|
e8e8363006160e0e,c87531715c568e6c,a10b932b55713331 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 210 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain