Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15DA23D337188963E4ECB01EEEF98B6A5A18D824AF330C58255F4827F9B41DDC792536D |
|
CONTENT
ssdeep
|
384:kbyGZi7nWV2skBoQ518Ok+HBkh8rdQLaL/qc0nlIZEZ7vVOg1J99dYlTn7VgfMmO:kbyGDV2skBj5s+HBkh8raLaL/qc0nlIt |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bb3bc0926dc4c1cb |
|
VISUAL
aHash
|
87818181818fffff |
|
VISUAL
dHash
|
1b1b1b1b1b3be4fa |
|
VISUAL
wHash
|
83818181818fffff |
|
VISUAL
colorHash
|
17200030000 |
|
VISUAL
cropResistant
|
1b1b1b1b1b3be4fa,25018589b183a505,76674565675f7d55,0e4c6d6c06434b4b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 10 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain