Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T129D30071604C56AEE2531AF8F0901F6BA243FF2ECA2530C1D3D953A517FADB1E50A389 |
|
CONTENT
ssdeep
|
1536:Cwh8NQkNaZyc4jbM6xRGeaEDmsaMHu+6G7UMrmMj/+8+/85mMj/K8+/8s:Cwh8NQkNa7cmMjw85mMjk8s |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ad8d7262b61e6ae0 |
|
VISUAL
aHash
|
813b1b1bf34141c0 |
|
VISUAL
dHash
|
67f2f2369687830a |
|
VISUAL
wHash
|
813b1b1bf34141fb |
|
VISUAL
colorHash
|
39480008000 |
|
VISUAL
cropResistant
|
3db6b636b5b5d6cc,67f2f2369687830a |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 190 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.