Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B223B67262211837A17FA3D9F155F71591E3E70FCA825BE2B1F863660AD5C62FC0381A |
|
CONTENT
ssdeep
|
768:ANnXW1KVrZWUdGGXmbybk6lqcrvrvEM3KjrxvBRDE8o5CJ09diEK:ANnXW1Yr0U7XmKnjMeAXDzSA0jiEK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b03243cfcdcd4d61 |
|
VISUAL
aHash
|
c3c7c3cfdfdfdfff |
|
VISUAL
dHash
|
8e0f8e3e34383e12 |
|
VISUAL
wHash
|
008783c3c7cfcfc3 |
|
VISUAL
colorHash
|
07400010240 |
|
VISUAL
cropResistant
|
8e0f8e3e34383e12,824a833b09135e5d |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 212 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain