Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14C7343713E429926604F43DF8267260E61C1DAC5F963B6D4ABF0D3285EB5CA2FBF0650 |
|
CONTENT
ssdeep
|
768:Q9Wqpx2zr1F4ZWqEuDgI+4bVZrrsxFwHzV3S044edDB:6Wux2fj4wqDg147EEHzVH44cd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d28de897e813684f |
|
VISUAL
aHash
|
ffff00040c0c04c0 |
|
VISUAL
dHash
|
2022181c6c5c1cb1 |
|
VISUAL
wHash
|
ffff808cbe0c0cc0 |
|
VISUAL
colorHash
|
02000000180 |
|
VISUAL
cropResistant
|
22220002181c1c4c,5c5c6cac3e3ede9c,4745ead23632d353,a0bcaebe9eb2a082,021c1c6c4c1c1cb1 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1119 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.