Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17FD2723563042D7E465786E0F7A1BB38A17ED349CA1F981CF3BC02B22BC6D989917694 |
|
CONTENT
ssdeep
|
384:8GK5ACJzzAQAA/p4DM2aUNBI9j19120pStAmWd8+dqbdU2dsUPmMwTVVJVlFgTPh:6rUo9ROVSb0UwsOmmLMpk |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9969b664c88dcb33 |
|
VISUAL
aHash
|
06061d1d191d0e1e |
|
VISUAL
dHash
|
965c7b73bbbbfcfc |
|
VISUAL
wHash
|
46070d3d1d1f1e1f |
|
VISUAL
colorHash
|
38006000040 |
|
VISUAL
cropResistant
|
965c7b73bbbbfcfc |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 64 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.