Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1725319DC3992F1926BB351F690BF140BB33E2817A80D9060D251EDD978B846D9137F9E |
|
CONTENT
ssdeep
|
768:6BiQgG5VcpJLayoSxHyOzxHRBaW/Sy3sIWj8zZs8LMRxNxULfDEMEddy1zLu+CEb:gBknyOloQzZs8ovQbx1nu1ugi |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
88dc72679cd8d989 |
|
VISUAL
aHash
|
8000181818180000 |
|
VISUAL
dHash
|
080c3232b2b30733 |
|
VISUAL
wHash
|
fce7df1b1b190101 |
|
VISUAL
colorHash
|
30000000038 |
|
VISUAL
cropResistant
|
307626402c210d4c,080c3232b2b30733 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 56 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain