Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18F14FB70D3646A3F962B46C8FB35F34DA19BF15DEB461494E3BC0A68B3C6DE5EA01084 |
|
CONTENT
ssdeep
|
1536:JMK2jXwokFMO2m7s7LhKwfF/N6NM7CVvJO/bTisO5d87qZHS/1jkg+LLLrIrA+93:e2O/KsO5d9HQRrA+9+0zCrGjQlZJ16 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cc4db1394cec3333 |
|
VISUAL
aHash
|
0000001000ffffff |
|
VISUAL
dHash
|
33f0aa63645c32a8 |
|
VISUAL
wHash
|
183c003000ffffff |
|
VISUAL
colorHash
|
17188008000 |
|
VISUAL
cropResistant
|
70b2b2f0f0cc8e0f,a2a4a4343484a0a2,20c02613bb2c1200,7330e88a2363c444 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 294 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.