Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14C44E6F3939400B71227CBDAF67A674D21E2B11DEF0A85809AE5076C5FF2D46A12BC35 |
|
CONTENT
ssdeep
|
1536:hiCh4Z4jNhvFj3nOVkbu2gggMpoSCt2QywJw5CIymOgyYcu5L670by6j0BqyqGWK:hggvvEkiSn/pGq4qNqA3/PR2 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
918164c2ded69eda |
|
VISUAL
aHash
|
ff4b1f3f1f0f0000 |
|
VISUAL
dHash
|
e2d2fafafbd9d82c |
|
VISUAL
wHash
|
ff4b1f3f1f0f0000 |
|
VISUAL
colorHash
|
1a402018000 |
|
VISUAL
cropResistant
|
808082d2d2c28080,e949191969a92981,42b0564325231bc4,e2d2fafafbd9d82c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2641 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain