Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1066263706215593F50DBC3F1F3766B2BB1E9C389DA078609A3EC83791BC6C45EC162A8 |
|
CONTENT
ssdeep
|
384:NYF/Iv1SqslXoOq/IsYoLQOChWsv2V4OBqp2CR85tUtS:GF/IvVslXoOq/IsYoLBC0xlTCRCtUtS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
99d866729989f166 |
|
VISUAL
aHash
|
c080183c1c0c0101 |
|
VISUAL
dHash
|
940d32716929160b |
|
VISUAL
wHash
|
ffc0d83c3c3f0303 |
|
VISUAL
colorHash
|
38000008081 |
|
VISUAL
cropResistant
|
940d32716929160b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 5303 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.