Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T152C153B29000273B138253D8627FA71979C3C1C6C611294862EA53CB8FDEE46D42B67B |
|
CONTENT
ssdeep
|
96:Tp7D7/7D7SarEc5ShgjUrWKgjUrWHgjPhji/kWiQ3eaL9Nh7D74gb9zrKw:F7D7/7D7hKmsUsVURiQOobh7D74gb9zP |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b9c64439123dc6ed |
|
VISUAL
aHash
|
18ffff8f8f8f838f |
|
VISUAL
dHash
|
f061181e183e3b1b |
|
VISUAL
wHash
|
0010ff8f8f8f838f |
|
VISUAL
colorHash
|
07000000180 |
|
VISUAL
cropResistant
|
71f0d4f4b2aa6969,c4181e18383f3b1b,69861364e4f40e60,200cb2b278200000,1008303232300801,01100c7232200c01 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain