Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13263847292612837607FB1D9F164B71991D3D74FCA8247E1A2FC936A0EDACA1FC53809 |
|
CONTENT
ssdeep
|
1536:w1zXWn2rUOjeV7sgjLgLTngypgQzgRmqOZox45QmO8TmUJF3bNiEq:CzXWfOyOTvpEmQmOwC |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b493651399ed9c2c |
|
VISUAL
aHash
|
0024dfffc7dfc3c3 |
|
VISUAL
dHash
|
e8e83630262c1616 |
|
VISUAL
wHash
|
0000d7ffc7c7c3c3 |
|
VISUAL
colorHash
|
07200010040 |
|
VISUAL
cropResistant
|
e8e83630262c1616,990d5931a1d12363,7979153d77373357,4e4f163f7b663bd3 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 210 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain