Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T162834070C695613B06234ED9B5716F0BB2D3930ECE67890467FC478EABEBCD5EA01486 |
|
CONTENT
ssdeep
|
1536:2W4AwcAxa2ay1apJGDfLTlzHWOCFkmiQ2oOh14FDB92:2eh592 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f6a51add62a80376 |
|
VISUAL
aHash
|
00ff66c3e6feff00 |
|
VISUAL
dHash
|
896cec8f4c48352d |
|
VISUAL
wHash
|
00ff6641e6fed700 |
|
VISUAL
colorHash
|
06e00008000 |
|
VISUAL
cropResistant
|
096cec8f4c482535,0000009393820080,010c686969697434,3535253d3db9edec |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 23 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain