Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14F43EBB11201177E0A0B81A6F52267EFE27EE14CE723869DB2EDC1659FC1C888D77761 |
|
CONTENT
ssdeep
|
768:XtwmBbKGWCGN0E5LNo7odoZoBoRo5o/Jq5n08e6iBbKGWCGA:Xtw0KGWCG5VOMe6iyaFKGWCGA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8873aa36aa332bce |
|
VISUAL
aHash
|
0918181818181c1d |
|
VISUAL
dHash
|
71b1bb33333b7273 |
|
VISUAL
wHash
|
8d3d3d18181c3d3f |
|
VISUAL
colorHash
|
31000010003 |
|
VISUAL
cropResistant
|
71b1bb33333b7273 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 249 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.
Pages with identical visual appearance (based on perceptual hash)