Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F5F3CD2475020CB719B386E0A1B17F95A093E30ED36F8E5566ED627B1FEBCA07150BB4 |
|
CONTENT
ssdeep
|
768:unsQ/w0mb56Jtnoqq7qdBzEqxhn+gIlQRFWNGfRGmAdHzMoanSb7XE+mI:ujNqyBzEqqgpRabeI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
96f8e9e0618569cd |
|
VISUAL
aHash
|
9d1c1c3e1c043e3e |
|
VISUAL
dHash
|
3170707c606c6c68 |
|
VISUAL
wHash
|
df1e1c0c3e063e2e |
|
VISUAL
colorHash
|
39200010200 |
|
VISUAL
cropResistant
|
041a1a32b2321a1a,a00080c0c0c08080,884a62edc6e0cccc,33078f92fb3727eb,6923a3869632e4cc,f0f1f3920d25ac68,3070707c606c6c68 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 53 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.