Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T132C27435B104503B13338AC876A2FF4DE1D3A25DCE4699A2F5FE239547D6DE288128B7 |
|
CONTENT
ssdeep
|
384:YWtQny7o+Rgg8FoiHbS+vYaRkYJnHxFpf0:/wy7o+Rx2oAbS+v9HPFpf0 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
88b036b69c3d3736 |
|
VISUAL
aHash
|
007e007e7e6e0000 |
|
VISUAL
dHash
|
0ed08cb2b2ccd0b0 |
|
VISUAL
wHash
|
027e427e7e7e0e18 |
|
VISUAL
colorHash
|
38000000180 |
|
VISUAL
cropResistant
|
0ed08cb2b2ccd0b0 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 287 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.