Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E8C29533452524AB231383CCEAE573C9F297914BCE2286C8F1E4D1B97ACDDA9AC51747 |
|
CONTENT
ssdeep
|
384:WDDNdCP6OfSQdka/1sPnKCJKxa9WtDX1ZufgB0sI8Npo:8CiesPnKWKE9WtDDu4B0D3 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ef13154a3c4f16c6 |
|
VISUAL
aHash
|
80838381f1f1f183 |
|
VISUAL
dHash
|
3f1b2f2363636326 |
|
VISUAL
wHash
|
818be381f1f1f1c3 |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
172b272363636336,8280828282828082,8280828282828082,8280828282828082,82001a72468e1282,0892494952488000,c0c4e0a292a6aab2,8ce67799e4841b27 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 7 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain