Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1EBD25335B544503723338BD876A1AF8DE1D2A25ECF0398A1F1EE238547D6DF289428B7 |
|
CONTENT
ssdeep
|
384:YWl5Qnyho+ggDFoiQB++WybXvjn79Fpz0:/2yho+x5ozB++HfFFpz0 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9de436b6883c323e |
|
VISUAL
aHash
|
027e007e7e7e0008 |
|
VISUAL
dHash
|
16c8ccf2b0cc5030 |
|
VISUAL
wHash
|
827e427e7e7e0618 |
|
VISUAL
colorHash
|
38000000180 |
|
VISUAL
cropResistant
|
16c8ccf2b0cc5030 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 284 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.