Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1FDF1C6322080593F572789A9B0E0F75A426DC31CC57BED6AF2DD11BB2BD6E40C9376A4 |
|
CONTENT
ssdeep
|
96:sET46YKvYJttf2Wk60/aP5B8x5pLFqupKFzXRcYbHvKcfkNII2U:sEUUYJUbKG5pLFBpKFiYbH5fsI4 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b4e44b39b4e0bc39 |
|
VISUAL
aHash
|
0200167767060000 |
|
VISUAL
dHash
|
aea1accccc7cd158 |
|
VISUAL
wHash
|
c35477f77f0f0800 |
|
VISUAL
colorHash
|
30180002000 |
|
VISUAL
cropResistant
|
25358f8d060fcd8c,6b6b90959595946b,aea1accccc7cd158 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 11 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.