Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14BC27573490D307F031392C8F5A9B249F383E14FCA71C5D8B6E9D16DAEC6EA9B851249 |
|
CONTENT
ssdeep
|
192:yvED3IMeLJ/AWbXbxIbNOIfgTOo25Z3T0fmNFIXHklAW4rNXEatI7YCwM/pFxFev:yvkGdbXbKbxg4X1ZufgB0sI8Npo |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8b8175caced6d268 |
|
VISUAL
aHash
|
7f031f3d3d3d0000 |
|
VISUAL
dHash
|
f8fafb696969fefe |
|
VISUAL
wHash
|
7f0f1f3f3d3d0000 |
|
VISUAL
colorHash
|
06c00000000 |
|
VISUAL
cropResistant
|
e8dafbf9e9696969,169edcebdbffbada,ff5a000000000000,f8faf9696969fffe |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 8 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain