Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15F23EAF252846966010ED7ACEB36B765F29764BCBFF749C5C3A88F490892DF1D809017 |
|
CONTENT
ssdeep
|
768:zwIkGhxi2wJ9aIsifQ2wJ9aIsiflmdW3kxvwmFyWvA9jsw7NC2:zZkGu2mfQ2mflmmEyWLAN7 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b33162357b94ce8c |
|
VISUAL
aHash
|
c3c7ffcfcffffffd |
|
VISUAL
dHash
|
0d1c685858241649 |
|
VISUAL
wHash
|
c1c4ffcf0c000cfd |
|
VISUAL
colorHash
|
07200012000 |
|
VISUAL
cropResistant
|
0d1c685858241649 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 22 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain