Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T121B419A8F2B0640D43A7017A617F354473B6691EA56944287679CCEAB8E494C323FFFC |
|
CONTENT
ssdeep
|
6144:kRPyUDP0SutXn0IphBXi+ZcWW3DjweQN8wXwB3q7lB+q5nt3Pg8vlK:lOcl7w0BF5WMA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f722dd88d988dd88 |
|
VISUAL
aHash
|
e7e7e7e7fffffffe |
|
VISUAL
dHash
|
0d4d4d4d0c000000 |
|
VISUAL
wHash
|
00e1202081fffffe |
|
VISUAL
colorHash
|
070000000cb |
|
VISUAL
cropResistant
|
0d4d4d4d0c000000,44cccccc8c4d06e8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 47 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain