Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E533C77291212837607FB2DAF159B70591D3D74FCA8297E2A1FC93660EDACA1FC47806 |
|
CONTENT
ssdeep
|
768:1KSXWnK9r5WbkCl29Be4P2tT2jWZ26z2jz2Hz2FP2tT2jqZ2/13PdiEq:1KSXWn4rUbCei973FiEq |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b416c363f19c3c6c |
|
VISUAL
aHash
|
0000d7ffc3c3ffff |
|
VISUAL
dHash
|
e8e836300f0f000e |
|
VISUAL
wHash
|
0000c3dfc1c3ffcf |
|
VISUAL
colorHash
|
07000008081 |
|
VISUAL
cropResistant
|
e8e836300f0f000e,3c191f652d242626,706040407274686c,53723336874c4c4f |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 210 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain