Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A1411E2B902D3A1B026327F8A687659CC3CB090CC4C0DD9819E8427C2BFEBC199FA0D5 |
|
CONTENT
ssdeep
|
48:ZHFv+FA8brXP4Y4Jk+ugm4JHsAgJX4JHO4JHs4JHE4JHPG+9:ripPBUk//UHsDJUHOUHsUHEUHPGk |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b63636cdc9003f36 |
|
VISUAL
aHash
|
0707070fffffffff |
|
VISUAL
dHash
|
adad2dad800e8e60 |
|
VISUAL
wHash
|
030307077fc3c0ff |
|
VISUAL
colorHash
|
0f000000070 |
|
VISUAL
cropResistant
|
adad2dad800e8e60,2a8e89a99999b7b8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain