Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16B73B760BA132926209F02CF9327571D22D2EFCDCF825AF555F4875496F5CE0BEA63A0 |
|
CONTENT
ssdeep
|
1536:pcG88eH888e+I+CXs88eQS4CfZi1AxViYJ88SV4ipS65KRaeSo:pcG88eH888e/s88eQS5H88SV4ipS65Y |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9999cc9d99992666 |
|
VISUAL
aHash
|
3c3c000c0c00383c |
|
VISUAL
dHash
|
71711c1919187030 |
|
VISUAL
wHash
|
bdbf808c0c04bcfc |
|
VISUAL
colorHash
|
38200000043 |
|
VISUAL
cropResistant
|
f46c6925b6233190,71711c1919187030 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 145380 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.