Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E713B673A100283761779ADAF566770AA1D3C70ECA4685C1F2FC53BA0FCACA2F911917 |
|
CONTENT
ssdeep
|
768:Y8vXS2rbQUCl2yeBdYuOZxz2Oz2Az2Z+HvSBz8mg:Y8vXS2rcPeBdYuOZHHO8mg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b8343507f1dcd4c6 |
|
VISUAL
aHash
|
0000ffffffffffff |
|
VISUAL
dHash
|
9e1e301408000206 |
|
VISUAL
wHash
|
000000c7ffffff83 |
|
VISUAL
colorHash
|
07000000180 |
|
VISUAL
cropResistant
|
9e1e301408000206 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 217 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain