Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A1845272D0B39037113F72E5F5A9A70E64D3D30BF74613F656A883681BC6D19AC2B4A8 |
|
CONTENT
ssdeep
|
6144:U+cDkdbw6Id34O8NTXxfpsSwhvE7aYX1vJ2ZPhg06OIcUDdHcKDixukrZDAnS+WM:U4nB |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bb054e4683bb86ce |
|
VISUAL
aHash
|
0000ffcfffffc1ff |
|
VISUAL
dHash
|
d8329b1f1f3b1b1b |
|
VISUAL
wHash
|
0000cf85efcf81ff |
|
VISUAL
colorHash
|
07001000180 |
|
VISUAL
cropResistant
|
8282c2d2d2828282,2a5a1a2200b8a00a,361b1f9f3b3b1b6b,c8c9e0d8ca0a1a0a,4a117169690e3232,5174706c6c70f871,4dcdc16172f97d79,797852764c4ccc4c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2590 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 7 other scans for this domain