Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1626112F14584A42901A282D18E32E369D386D574DF730B079AE5E75EBBDBFD8CC05079 |
|
CONTENT
ssdeep
|
48:TXjLFTNmTNMitOKsanfI6SfnCw02hse5SnCw02hsesdQ5YpP5hvopBliFOo6wXmb:TTLG4KVZS6l3ONl3/2Ex0ZN |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c958e663b30e35e2 |
|
VISUAL
aHash
|
001818180000ffff |
|
VISUAL
dHash
|
91b2b0b0dbd2e200 |
|
VISUAL
wHash
|
007c5c584848ffff |
|
VISUAL
colorHash
|
0b580001000 |
|
VISUAL
cropResistant
|
d4e0d4d0d0d6dcdc,e0e1000800150800,1db2b1b0b1dbd2f2 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 28 techniques to evade detection by security scanners and make reverse engineering more difficult.
| ID | Portuguese | English | Trigger |
|---|---|---|---|
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain