Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16413B772D1202837616FB6DAF564B315D1D3D70ECE8247E1A1F8A36A0EDACA1FD4740A |
|
CONTENT
ssdeep
|
768:glpXWnKJrYWGkCl25tKP2jWZ26z2Ez2mWz2mP2jqZ2o/x9bgjXbgLTbbg0ycyrwy:glpXWn4r/GA1ansgjLgLTngZZrCiEq |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b846471393ccbcbc |
|
VISUAL
aHash
|
0000d3ffcfcfffff |
|
VISUAL
dHash
|
e8e836343a3a000e |
|
VISUAL
wHash
|
000002dfcfcfffc3 |
|
VISUAL
colorHash
|
072090000c0 |
|
VISUAL
cropResistant
|
e8e836343a3a000e,9e8c0f3636262626 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 212 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain