Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B3F1FFB14210297FF15B8CF5F7307A24F06BA79AE49B8298D2BD43B19BCEC84D521470 |
|
CONTENT
ssdeep
|
192:JqyCYddTDOVVsRfTU+1fTU+1fTU+1fTU+1fTU+hP/Nm:J9CKJDqV+f51f51f51f51f5hPlm |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9e1e4343435e5f43 |
|
VISUAL
aHash
|
009f9f9fffffffff |
|
VISUAL
dHash
|
c83a3928d2210000 |
|
VISUAL
wHash
|
008f9d9fff010000 |
|
VISUAL
colorHash
|
07007008000 |
|
VISUAL
cropResistant
|
c2c282c2c2c2c2c2,3838282cc1200000,c8c8c8c0c9269000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 4 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain