Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DEA2D673904C4D3EE22316C875E1AB2FB1E1528BDE4A2481B1EC77F91FE6CA19D07609 |
|
CONTENT
ssdeep
|
384:z8ZpWq151P9JheIaHjkCHZI7mo4+IZKDIoY8I3l93UTheIPp29sN88Iz+gz4:zcWq151P9JhpaH9IZxIZCIoY8I3l93UL |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
dd8877227788dd82 |
|
VISUAL
aHash
|
0018181818180000 |
|
VISUAL
dHash
|
0c32b2b2b2b28c30 |
|
VISUAL
wHash
|
031b1f1ff8f89800 |
|
VISUAL
colorHash
|
000000001c0 |
|
VISUAL
cropResistant
|
88aa96baaa338686,0c32b2b2b2b28c30 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 9 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 2 other scans for this domain