Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T138334B726731B9AC83DB41EEF7382D5AB2C5949DE8CB4400B5C9969D23C7C907287BB4 |
|
CONTENT
ssdeep
|
1536:aeQE+EsZ/8vfzDVR0MjBfRiMjB8DrpRXPZlQaQD9OehM+BrUgq4z:aLORRR0DrpR/PkEeDz |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fb91c4c4f49191d3 |
|
VISUAL
aHash
|
ff858d8181818181 |
|
VISUAL
dHash
|
035959594d414159 |
|
VISUAL
wHash
|
ff8f8f8f8181a181 |
|
VISUAL
colorHash
|
324000000c0 |
|
VISUAL
cropResistant
|
035959594d414159,64d4848482828280,030303c3d3030303,dc9a98dccaa29839 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 17 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 3 other scans for this domain