Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T156A2AB71C08110AF1936DDA3FB75BB56D0C7E32E8A31C81096648E5EEED6EE0536249B |
|
CONTENT
ssdeep
|
192:s8Uut0MRJ4jSL7chyte4JirHTVOMwYdUKmmMJh7tb2ZStIvqKxf+LVdCrGRVt2zE:hkKfVu+qNGlKcA2/2z7ctPok |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e6196666cccccc66 |
|
VISUAL
aHash
|
e7e7ffe7e7e7e7e7 |
|
VISUAL
dHash
|
cc4d180c4d4d4d45 |
|
VISUAL
wHash
|
42c3c3c3e7c3c3c3 |
|
VISUAL
colorHash
|
07001030000 |
|
VISUAL
cropResistant
|
cc4d180c4d4d4d45,41c1a319cdcd1d39,2f1d7cfc7c7cfcfc |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 96 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain