Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A2935CA43A1CF67669F343D760DF2503B278521B980E4C10A250EDADB2EDC9AA077ED5 |
|
CONTENT
ssdeep
|
1536:QTXodjSejJbz018WVNhh8z/thBXRjaPndD5Dd8r:ldJbshmz/TBdYBa |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fb81d08cc78eb0a7 |
|
VISUAL
aHash
|
ffcbc1a1a3858181 |
|
VISUAL
dHash
|
e31b19494f1d1d5d |
|
VISUAL
wHash
|
ffcbc5e1a3858181 |
|
VISUAL
colorHash
|
06600008000 |
|
VISUAL
cropResistant
|
e31b19494f1d1d5d,6b7a5cdcc9899892,0f3f6edb1b31e166,8e156c654b2acbcf,b57c783870073f78,b02b6765714e59f3,4e430d2643419080 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 10 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain