Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14F73867292102437617F79D9F165771AA2D3C70FCA8257E1E2F893AA0FD6CA1F81340A |
|
CONTENT
ssdeep
|
1536:j01XWn9rq/2+mGyyr2jYuOteDDZo7HU7HP7HT7Hd7He7HP7HY7HT7HL7HC7HM7HG:Y1XWU/2k16suON707v7z797+7v747z7Y |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b8471231c798edbc |
|
VISUAL
aHash
|
0000d3ffc3c3dfff |
|
VISUAL
dHash
|
e8e8b6300e1a3032 |
|
VISUAL
wHash
|
000053dfc3c3cfdf |
|
VISUAL
colorHash
|
07600000080 |
|
VISUAL
cropResistant
|
e8e8b6300e1a3032 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 229 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain