Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13B33C87291202837617FB2D9F554B70591D3D74FCB8287E2A1F8A36A0EDACA1FC53816 |
|
CONTENT
ssdeep
|
1536:RASXWn4re7YFeK3FgkL4i8yARpF2oEpu73mdiEq:uSXW77WgW4Rympcomu7h |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b8474e13f3cc9839 |
|
VISUAL
aHash
|
0000dbffcfcfc3c3 |
|
VISUAL
dHash
|
e8e836229a183616 |
|
VISUAL
wHash
|
0000d3dfcfcfc3c3 |
|
VISUAL
colorHash
|
07200010080 |
|
VISUAL
cropResistant
|
e8e836229a183616,4fdcec7b39393929,4352d1d8e8e8f074 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 210 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain