Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T184B419A8F2B0640D43A7017A617F354473B6691EA56944287679CCEAB8E494C323FFFC |
|
CONTENT
ssdeep
|
6144:YRPyUDP0SutXn0IphBXi+ZcWW3DjweQN8wXwB3q7lB+q5nt3Pg8vlK:JOcl7w0BF5WMA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f7225d88dd88dd28 |
|
VISUAL
aHash
|
c3e7e7e7fffffffe |
|
VISUAL
dHash
|
0d4d4d4d0c000000 |
|
VISUAL
wHash
|
00c3030381ffcfce |
|
VISUAL
colorHash
|
070000000cb |
|
VISUAL
cropResistant
|
0d4d4d4d0c000000,44cccccc8c4d06e8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 47 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain