Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DDB240A4A3B7D7E3A10EBED8D7B473D4B587E79BCB816BD4045E43C909D08A84C5B242 |
|
CONTENT
ssdeep
|
384:58LA/k/+pSz39YVT40vYBEn2dsLqY0wzfL5:58LA8B7kF |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
92c66c3ab26c29bb |
|
VISUAL
aHash
|
917e646e0c0c00df |
|
VISUAL
dHash
|
63e4c4ccc808c69b |
|
VISUAL
wHash
|
817e7e7c0e0c00ff |
|
VISUAL
colorHash
|
30200030000 |
|
VISUAL
cropResistant
|
63e4c4ccc808c69b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 976 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain