Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T132930131A715657B81EBCAD0BA26436F63B2FA0DC6934241B3F8C35C2BD9D54ED11C2A |
|
CONTENT
ssdeep
|
1536:H6lrk9KeIxufci18/GJJTqddqHERObo1iU+S6t4reUZ6wMFyjwZWX/lpvsSGtxKY:HYk9KeIxufci18/GJJTqddqHERObo1iZ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fe6ec1c129969534 |
|
VISUAL
aHash
|
fb81818181ffffff |
|
VISUAL
dHash
|
2323292b2b039836 |
|
VISUAL
wHash
|
9181818181d3ffff |
|
VISUAL
colorHash
|
07c00000000 |
|
VISUAL
cropResistant
|
2323292b2b039836,a4c4646464606162,b094949c9c9c9c16,141c1c1c1e1c1e29,8484959195959747,c7e767c7c7c7c7c7 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 71 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain