Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1FFC22032C0427533625B42E5F46177A526D3C22FCE4B08056BBC9B963FEBDA67482A4D |
|
CONTENT
ssdeep
|
768:ICWLEMdneec+CLpdhDNe1ARkapjTdPUxkUi:eLLdneec+CLpdhDNe1ARkapjTdPUxkUi |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ad3dd2c2c2d233cc |
|
VISUAL
aHash
|
ff8383838383ffff |
|
VISUAL
dHash
|
6e26262626164066 |
|
VISUAL
wHash
|
bf0301010183ffff |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
6e26262626164066,8094293b33a480a0,103033ccf0616004 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 107 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain