Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13491F011200176BBD547AD8ABAB15F1821735289DEDBC18927FC4F8917E3EEC8C1E889 |
|
CONTENT
ssdeep
|
96:NjSzmxUA0ESknzUIIl/MEDdJbkeZNiJvF8G:NjSzmx30FknwIIl/MEDdzk |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ce3331cc3198ce67 |
|
VISUAL
aHash
|
0000303c30301000 |
|
VISUAL
dHash
|
0060646160646000 |
|
VISUAL
wHash
|
003c3c3c3c3c3c00 |
|
VISUAL
colorHash
|
38403000000 |
|
VISUAL
cropResistant
|
a3233831316b787b,123ca428e23e3366,0060646160646000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 13 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.
Pages with identical visual appearance (based on perceptual hash)