Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1FC81A97250144D3EA093D5E0FBD6FB1721958282D20B095863E8979FDDD9CE1DCD5278 |
|
CONTENT
ssdeep
|
48:T6MU2dXF0rrracAuYpdLCnYqyViZ51AX1saHUCX4jApmqJXNApmqJLSNAKK:TWDOcAufnYdVij1AFLXq0Jd0J2NAKK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b2cdcd303a36c9b1 |
|
VISUAL
aHash
|
ffffff87878787cf |
|
VISUAL
dHash
|
230cc02d1d1e2f1e |
|
VISUAL
wHash
|
dfbfc48002000103 |
|
VISUAL
colorHash
|
06201010040 |
|
VISUAL
cropResistant
|
230cc02d1d1e2f1e,3960e4e687968ccc,c9e992969cc8b998 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 8 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain