Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10E51EBB067288CF36C4556AD7BE1B185695AC5E4CF132218D9F48BDC1BC6E40CF21AD4 |
|
CONTENT
ssdeep
|
48:Lup0nTXOtM+MAOfbklmagqYZdfog64iPle0baVcBLBG:LuWTA7iQY0g64iPjaKL0 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c9646699996633b3 |
|
VISUAL
aHash
|
0000405a5a000000 |
|
VISUAL
dHash
|
80144cb2b20c0480 |
|
VISUAL
wHash
|
40e0e2ffffe2e040 |
|
VISUAL
colorHash
|
38000000007 |
|
VISUAL
cropResistant
|
40008d929b0c1232,80144cb2b20c0480 |
Fake Netflix login page with 1 form. Victim enters credentials which are captured and transmitted to attacker's server. Page may impersonate Netflix official login to appear legitimate.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain