Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19253867292212837617FB5D9F164771991D3D70FCA8247E1A2F8936A0FDACA1FC5380A |
|
CONTENT
ssdeep
|
1536:l3aXWn+r/cVelefglkgbUg+8glrgUYgL+iXYa2HyEH4nGOuglZQmTF3kiEq:1aXWwcqVcj19aa2SEKGNglZ7 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e412136ded99ac6c |
|
VISUAL
aHash
|
0020dfffc3c3efc3 |
|
VISUAL
dHash
|
e8e8363027261e0e |
|
VISUAL
wHash
|
0000dfffc3c3c7c3 |
|
VISUAL
colorHash
|
07400008040 |
|
VISUAL
cropResistant
|
e8e8363027261e0e,8c4d73d99d0d0e96,6955c6c4acb85769,b28c7331386b3f1f,a3b2b2b8d8e4e46c,31145a707133b334 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 212 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain