Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B472D7787EA431B9310747B8B1959B9EF15B121ECB13ACE4F2C892D453CE8B6CD851E8 |
|
CONTENT
ssdeep
|
192:ATnOiRwdp7Rwb51kgaDXaip5gUNo8ewwYFqf6rMIo8ewwYF+SP9MYb:SnOAwuSO8eV58eyvb |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
96d66d3434b49696 |
|
VISUAL
aHash
|
66707e3e36360000 |
|
VISUAL
dHash
|
d4c9e4ccccec1204 |
|
VISUAL
wHash
|
76707e7e7e7e0000 |
|
VISUAL
colorHash
|
38000007000 |
|
VISUAL
cropResistant
|
d4c9e4ccccec1204 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 242730 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.