Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BA2138765004584F82031CD3FD23B65C70DF530EFE517940B8F852F91BD6E618B59142 |
|
CONTENT
ssdeep
|
24:hR0l4JFAePpXoGao0CV+A84Sjp8vOnLGB2cZL23k6gNCa:TNFjpX50CKjQ2cM0 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
df9b20acc953239c |
|
VISUAL
aHash
|
00002dfcff260000 |
|
VISUAL
dHash
|
cba949782045a453 |
|
VISUAL
wHash
|
0054bffcffb75000 |
|
VISUAL
colorHash
|
39600008000 |
|
VISUAL
cropResistant
|
ea0082c2420200ea,cba949782045a453 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 46 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.