Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11F02B6214105106B81BB67C8B9B24B0861BEC35DE613091CB3EE5ABFBFC9C5C693789D |
|
CONTENT
ssdeep
|
192:8ERzxHCqOl/lallO4+3q0AJb+VxVswIg+eOsMRiOd:8ERzxH98NAlp9+V3swSd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
815fd6446753135d |
|
VISUAL
aHash
|
009f0f0b0b5fffff |
|
VISUAL
dHash
|
c8371bdbfa9aa20a |
|
VISUAL
wHash
|
001f0f09030f7fff |
|
VISUAL
colorHash
|
06206040000 |
|
VISUAL
cropResistant
|
800082d2d2800080,3238dbeaba9caa4a,03d4c0c0d4239090,6f6793d9bcb0b49c,6661aaf3f1cb1b31,4000696969690048,050f7a5eed1b1b8d |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 44 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.