Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16EF3D7CC2B7069E589CC9BDB7F01B5A97827A1FA999288C8D05C4F5C14D3D2CBD4AD83 |
|
CONTENT
ssdeep
|
1536:OsvsUKbEEEcFOHjcadUQjByQVfZzIZSc3PUKufpxBfPGrq+Y6q7dXdhR1bz5:OmDL/z5 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fc0782c0d796c6d3 |
|
VISUAL
aHash
|
7e000090c0f0e0c0 |
|
VISUAL
dHash
|
c04f763202130101 |
|
VISUAL
wHash
|
7f0382d8f8f0f0f0 |
|
VISUAL
colorHash
|
10000000e00 |
|
VISUAL
cropResistant
|
8800ccd0d0d40080,0000000000080000,c04f763202130101 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 275 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.