Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11D44D8F69294007312279BDAF679B75D21D7B16EEF0686C09AE4076C1FF2D46A12BC30 |
|
CONTENT
ssdeep
|
1536:hH4Z4jRiWN+3nOFh/kggggHQI2duiwJw5TIymOgyYcR6jf5L67ZO6jw26jepqf63:5ggUWNL/wQPdW7TGqEqJ5X7Rk |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
92854dc8cdde9a9a |
|
VISUAL
aHash
|
7f470f0f0f0f0400 |
|
VISUAL
dHash
|
e2defcfcbcbdac38 |
|
VISUAL
wHash
|
ff4f0f1f1f0f0400 |
|
VISUAL
colorHash
|
1b602000000 |
|
VISUAL
cropResistant
|
808082d2d2c28080,e1493919c8a9a9d0,42b0565327231be4,f2d2c0b0ac98f8f0,ffffdfbaf4ccdcfc,e2defcfcbcbdac38 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 136 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain