Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1939343729125283760BB75DAF124771EA2D7D74FCA8347E1A2F8939A0FDAC91EC13409 |
|
CONTENT
ssdeep
|
1536:ms+XWn4r6e+e9Hsg+EglAgcQg7tgNDgvHgiLguDgEpg8ggNOg8IgK8g4DgcYg7qo:B+XWzeQXaNiCrLdLncwGFxLr40PuQmUd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b2473247d99ccc3c |
|
VISUAL
aHash
|
0024d7ffc3ffc7c7 |
|
VISUAL
dHash
|
cccd2e300e069d1d |
|
VISUAL
wHash
|
0000c7ffc3c7c7c7 |
|
VISUAL
colorHash
|
07600000000 |
|
VISUAL
cropResistant
|
cccd2e300e069d1d,b9bb0ba393939393,05e1d9d9c305d1d1,36c9c5656d63c020 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 211 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain