Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13873877292502437617B79D9F164771AA2D3C70FCA8256E1A2F893AA0FD6CE1FC1344E |
|
CONTENT
ssdeep
|
1536:+30WP2XWn9rqKY+Xe0O2GNgYuOneRtZ17HP7Hl7HN7Hy7HH7HE7H37Hf7HQ7HE72:+kWP2XWsKYiXytuO87v7F7t7S7n7k7X+ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b4434731c99cecbc |
|
VISUAL
aHash
|
0000c3ffc3c3dfff |
|
VISUAL
dHash
|
e8c8a630163e2032 |
|
VISUAL
wHash
|
0000c3cfc3c3dfdf |
|
VISUAL
colorHash
|
072020000c0 |
|
VISUAL
cropResistant
|
e8c8a630163e2032 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 229 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain