Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T177D46CEA27A5943746D1828AA079471363397E0E5409C12CFB3FFDDB2A98D85B077B70 |
|
CONTENT
ssdeep
|
6144:3p0OgYwYU1hpPvKpIZ4WlIt3KIKwRWqW2fCCJjRbofTJqxhmlZt7iIlRBWYSn1GS:3NUvBy0ItHn5fCCJ+1lR9jW |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b0b04fcf9947c6b0 |
|
VISUAL
aHash
|
ffc7c7c7c7000000 |
|
VISUAL
dHash
|
c09e9e9e1e8e4623 |
|
VISUAL
wHash
|
ffc7c7c7c7e80000 |
|
VISUAL
colorHash
|
06000038000 |
|
VISUAL
cropResistant
|
c09e9e9e9e9e9e9e,7b79d1353dbf9b9d,0110044456562329 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 232 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.